Friday, March 03, 2017

Things hackers would like you to know

Most hackers are more interested in simply showing that they can gain access to systems than they are in actually making money or punishing their targets, a Nuix report states. Hackers used direct server and phishing attacks most often to penetrate systems, the report states.

A new cybersecurity report skipped the survey of recent breaches and instead went to the source -- asking 70 penetration testers at the DEFCON conference about their tactics, motivations and thoughts on the systems they target.
The Report  "illuminates the true nexus between attacker methodology and defensive posture," Nuix Chief Information Security Officer Chris Pogue said in announcing the report's release.  Among the more interesting findings:
  1. Direct server attacks were the most popular method for breaking into systems, slightly more so than phishing attacks.
  1. Eighty-four percent of attackers, however, said they used some sort of social engineering to gather information about their targets.
  1. Half the hackers said they changed their attack methodologies with every target, and another 38 percent said they mixed things up at least every six months.
  1. Only 5 percent said they changed tactics because old methods were no longer effective; 56 percent said they did so mainly to learn new techniques.
  1. Similarly, 66 percent cited "the challenge" of penetrating a system as their main motivation. Just 12 percent said either money or ideology were the main driver.
  1. That test-yourself mentality was also reflected in the hackers' regard for traditional security certifications. While many said they had multiple certifications themselves, 76 percent called such credentials a poor indicator of technical ability.
  1. End-point security technologies presented the most effective defense, respondents said. Just 10 percent said firewalls were the best defense -- and 22 percent claimed that no countermeasure could keep them out of a system indefinitely.

  1. Perhaps that's because too many defenses are poorly maintained. Nearly two-thirds of the pen testers said their biggest frustration is that most organizations don't fix vulnerabilities after they’ve been identified. 

I buy most of my training at Training Planet. Great prices and selection of certifications.