Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 7 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Beware the Drive-by Attack

by The Gurus
September 13, 2016
in This Week's Gurus

????????????????????????????????????

Share on FacebookShare on Twitter

In recent years, we have witnessed a new kind of security threat which all businesses need to be aware of – the cyber drive-by attack. It is a term that has evolved over time. In the early days of the web, most online access was through a modem, and users were charged for the time they spent connected. Opportunists, looking for free online access would literally drive the streets of a town waiting for a Wi-Fi signal to become available. If it was insecure, and in those days it frequently was, that ‘drive-by’ approach enabled the perpetrator to get onto the Internet for free.
Over time, the drive-by evolved into something more sinister and more precisely targeted. Today, cyber-criminals are focused on latching onto home networks, not simply to access the Internet but more specifically to find their way past badly secured routers by effectively working out the brand, listening to the traffic and weakening the main password over time. Once that password has been compromised, the hacker has ‘carte blanche’ to access the machine and add malware, or some kind of key logger software, enabling them to wait until the users’ access their bank, for example, and then log the keys and decrypt the password. This kind of cyber drive-by attack is not difficult to execute, it just requires the perpetrator to bring the right level of enthusiasm and impetus to the party.
But while the most literal possible interpretation of the cyber drive-by, this kind of attack is typically a one-on-one affair. More concerning for the corporation, is the more random, scattergun variation on the theme which sees criminals spread malware online onto unsuspecting businesses and their users. The fact that they will not be looking specifically for you will be of little comfort if you are one of the organisations affected.  And what is especially sinister is that this version of the ‘drive-by’ does not need any user interaction to be effective and only requires one vulnerability to be exposed to the outside world.  Sometimes there is an element of social engineering involved, clicking a link on an infected website which then installs a key-logger or possibly what is known as ‘man in the middle’ software, which allows the attacker to effectively eavesdrop on victims by manipulating a set-up conversation between multiple parties.  More often than not, however, the drive-by attack has evolved to the point where it can impact on any business user who simply visits a legitimate – but compromised – website, and is infected through a popup or ad, or by being redirected to another infected site.  As already referenced, the software installed could be something like a keylogger or some form of spyware, or worse still it could be a banking Trojan, capable of stealing a business’s online banking credentials, or ransomware that simply encrypts all of the company’s data with a key that the organisation cannot access, unless they pay up.
Finding a Solution
Cyber-crime is a growing problem for all organisations today. In 2015, the British insurance company Lloyd’s estimated that cyber-attacks cost businesses as much as $400 billion a year.  The cyber drive-by attack is just one element of this, of course, but it is a significant threat to businesses all the same.  Its random nature makes it difficult to defend against, especially as it only needs one attack to get through to potentially cause significant damage to the business.
Part of this is about putting the right technology in place. Businesses should ensure they update machines regularly with all the latest security patches and script blocking plug-ins, and be certain to implement state-of-the-art malware detection or antivirus programs across the business.  However, there also needs to be a significant element of managing employee behaviour, as well as educating employees around a best practice security approach. It would be a sensible approach, for example, to prevent staff from having local administrative access to their devices.
While providing remote access to the corporate network can bring enormous productivity benefits, companies also need to educate their employees about how best to protect their business devices in the home environment.  It’s a good precaution to prevent them from installing devices onto the machine at home – home printers being a good example – as doing so could potentially leave the device more vulnerable to attack. Good password protection is key both in the office and when working from home. It’s vital that passwords not only protect the office network but also the machine more generally because without that additional layer of protection, the user is effectively creating a pathway for malware and other cyber threats to potentially put the business at risk.
Again, much of this comes down to better educating the workforce. There’s a balance to be struck here, of course.  Any business wants to give out a message to their workforce that they trust them. It’s a key element of a positive and productive culture after all, but, at the same time, every employee needs to be aware of the cyber threats facing the organisation and what they specifically can do to make the business more secure.
Some companies put their workforce through monthly training cycles. Others send emails with scams embedded within them and then follow up with those individuals who click on the links to provide additional training. But it’s also important not to overdo this. Daily security messages to staff will attract interest and be widely read over the first week or two after they are first disseminated.
Over time, however, if there are no consequences, people will inevitably begin to skim over, or simply ignore them. And in a world where the cyber drive-by attack is a persistent and an ongoing threat that has to be a serious concern. In today’s complex business and technological environment, it can no longer be the sole responsibility of the IT department to keep organisations secure. Technology will continue to play an important role but employees also need to be aware of the threats that are out there. They need to understand best practice and appreciate that they cannot compromise the security of the whole business for the sake of their personal convenience. Businesses can’t entirely eliminate the threat of a drive-by attack, of course, but by educating their workforce and encouraging them to behave responsibly at all times, they can significantly reduce the risks.

FacebookTweetLinkedIn
ShareTweet
Previous Post

The Four Cybersecurity Terms Businesses Need to Know

Next Post

Cyber Attacks Inflict Unprecedented Damage; Enterprises Still Lack Intelligence

Recent News

Standard post, logos of brands, headshot.

J Brand: The Challenges of Putting Mental Health First in an Unfamiliar Industry

June 6, 2023
iPad with Anxiety written on it in capitals.

Half of UK Employees Suffer From “Sunday Scaries”

June 6, 2023
UK Organisations lack clear path to achieve threat intelligence

UK Organisations lack clear path to achieve threat intelligence

June 6, 2023
A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information