New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

From DDoS to bots and everything in between: Preparing for the new and improved attacker toolbox

New York Tech Editorial Team by New York Tech Editorial Team
December 8, 2021
in Cybersecurity
0
From DDoS to bots and everything in between: Preparing for the new and improved attacker toolbox
Share on FacebookShare on Twitter

A quick glance at global headlines shows a new breach, ransomware, DDoS, or bot attack on a near-daily basis. Orchestrating these attacks and selling hacking tools has become a lucrative business strategy for those on the dark side. Much of the increased success of attacks can be attributed to how threat actors and cybercriminals have industrialized their toolboxes to remain one step ahead of defenses and stay off radar.

attacker toolbox

As defenses improve, attackers have also found a way to always remain at least one step ahead of their targets. Much like sappers getting behind enemy lines to attack and destroy critical infrastructure, threat actors know how to avoid tripwires and stay below the threshold of detection while initiating an attack. Low and slow attacks are now the name of the game, and as a result, cybercriminals are more successful and productive than ever before.

To counter those efforts, organizations need to gain a better understanding of the new attacker toolbox and employ solutions that take a more holistic view of defense.

A blended attack approach is proving successful

A common thread is evident in modern attacks: attackers increasingly rely on a blended approach of tools and techniques that aren’t immediately – or easily – recognized by traditional and/or point perimeter defenses. A few examples of what these blended attacks could look like:

Militarized attack patterns

Companies or organizations within the same vertical (e.g., credit unions) are at risk of getting caught in the crosshairs of a single APT. In this instance, attackers will profile one credit union and use that knowledge to attack other credit unions with a similar tech stack. This is possible because so many organizations use the same software and are thus susceptible to the same vulnerabilities.

Low and slow

Attackers play the long game. They understand how much pressure a tripwire can sustain before it trips. Attackers often spend a significant amount of time (months or even more) poking around the edges of an organization to see what the thresholds are. As a second phase, they will meter their attack to come in under that threshold and go after high-profile assets.

Misdirection

This is becoming more common in DDoS attacks and ransomware attacks. Attackers occupy the attention of an organization’s security team with a DDoS attack, and then they interleave the “real” attack against other assets.

These blended, mixed mode attacks are difficult for organizations to get a handle on, which is one of the reasons these methods often succeed. Organizations are left feeling like they are playing a never-ending game of whack-a-mole while trying to proactively shore up their security.

Making matters more difficult is that many organizations rely on outdated defense strategies and point products that focus on blocking a single variant of an automated attack. These tools were developed to do one thing and aren’t cutting it anymore. It is time for organizations to take a new approach or suffer the consequences of outdated defense strategies.

A new era of threats requires a new era of solutions

To protect themselves, organizations need to take a step back to gain a wide-angle view of their defenses against cyberthreats. Defenses that only alert or stop one method will leave organizations exposed to others. Understanding the context behind attacks gives security teams the insight to monitor and block suspicious behavior and mount a more holistic defense.

Further, it is important to take an attacker-centric approach to defense. This mindset shift is more proactive than reactive and ensures attackers are both identified and tracked, even if their IP or identifying traits morph. This approach allows for adaptive enforcement and action in which attackers, both human and non-human, are systematically confronted to understand their intent. These actions could include blocking entities, interrogating, and mitigating, or tarpitting suspicious traffic.

The good news is that while the nature of cyberthreats has evolved over the years, so have cybersecurity defenses. It is imperative that organizations choose defense techniques that provide solutions for the modern problems they face. The best way to remain an easy target is to remain static by using outdated defense techniques.

How will you prepare for the new and improved attacker toolbox?

Credit: Source link

Previous Post

Indonesian fintech Flip secures $48M in Series B to support expansion – TechCrunch

Next Post

Lydia grabs another $100 million for its European financial super app – TechCrunch

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
Lydia grabs another $100 million for its European financial super app – TechCrunch

Lydia grabs another $100 million for its European financial super app – TechCrunch

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
UK VC fund performance up on last year

VC-backed Aerium develops antibody treatment for Covid-19

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
Coffee Nova’s $COFFEE Token

Coffee Nova’s $COFFEE Token

May 29, 2025
Money TLV website

BridgerPay to Spotlight Cross-Border Payments Innovation at Money TLV 2025

May 27, 2025
The Future of Software Development: Why Low-Code Is Here to Stay

Building Brand Loyalty Starts With Your Team

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Creative Swag Ideas for Hackathons & Launch Parties

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Strengthening Cloud Security With Automation

May 22, 2025
How Local IT Services in Anderson Can Boost Your Business Efficiency

Why VPNs Are a Must for Entrepreneurs in Asia

May 22, 2025

Recommended

Coffee Nova’s $COFFEE Token

Coffee Nova’s $COFFEE Token

May 29, 2025
Money TLV website

BridgerPay to Spotlight Cross-Border Payments Innovation at Money TLV 2025

May 27, 2025
The Future of Software Development: Why Low-Code Is Here to Stay

Building Brand Loyalty Starts With Your Team

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Creative Swag Ideas for Hackathons & Launch Parties

May 23, 2025

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

3D bio-printing acoustic AI Allseated B2B marketing Business carbon footprint climate change coding Collaborations Companies To Watch consumer tech crypto cryptocurrency deforestation drones earphones Entrepreneur Fetcherr Finance Fintech food security Investing Investors investorsummit israelitech Leaders LinkedIn Leaders Metaverse news OurCrowd PR Real Estate reforestation software start- up Startups Startups On Demand startuptech Tech Tech leaders technology UAVs Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media