1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

How to mitigate hackers who farm their victims

Discussion in 'CSO' started by RSS, Sep 27, 2016.

  1. RSS

    RSS New Member Member

    Nation-states and savvy criminal hackers don’t pull uninformed, spur-of-the-moment smash-and-grab jobs on data networks. They reconnoiter and position themselves to slowly implement precise surgical maneuvers to exfiltrate your information treasures. Most of these attackers are capable of ensuring you remain unaware of their movements until it is to their benefit for you to know.

    High-profile attacks that leveraged extended dwell time inside the networks of large retail chains such as Target are examples of how hackers farm or manage victim organizations in this manner.

    Hackers farm their targets by maintaining a veiled presence in sensitive places in and around government and enterprise networks, revealing their position in a calculated way at an optimal time to achieve some strategic goal, says Danny Rogers, CEO at Terbium Labs.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page