How Cyber-Attacks Start (Part 2)
In Part 1 of this series we started to look at some of the tactics that attackers use to initially gain access to systems in your institution. The...
There are many types of cyber-attacks used by criminals today. Financial institutions should employ a layered approach to defending against these attacks. These layers are often thought of in terms of tangible entities like users, workstations, connections, or applications. An alternative way to think about cybersecurity layers is in terms of tactics an attacker can use.
The MITRE ATT&CK Framework is used by many security professionals to help identify tactics and techniques used in cyber-attacks. The framework logically organizes attacks into 12 “tactics” which an organization can use to assess and strengthen its controls. This week, we will start to look at the “Initial Access” tactic, which identifies ways that an attack can be launched on an organization.
According to MITRE ATT&CK, there are 11 techniques used to gain initial access to the internal systems in an organization (these exclude attacks on mobile devices, for which MITRE has an entirely different matrix). We will describe the techniques and mitigating controls of the first 4 of these techniques this week and the remainder next week:
Next week, we will continue this discussion by looking at the remaining 7 techniques used to gain initial access to internal systems.
If you want to dig deeper into creating a security program that protects against all of the different tactics used by attackers, please contact us at support@bedelsecurity.com.
In Part 1 of this series we started to look at some of the tactics that attackers use to initially gain access to systems in your institution. The...
The Finastra ransomware attack from last week reminded us all of that.
Phishing remains one of the top threats to organizations today. Every user regularly receives emails designed to trick them into clicking on a link,...