Cyber systems overlooking how attackers actually work, says study

Cyber systems overlooking how attackers actually work, says study

Most cyber defence systems and strategies fail to factor in how attackers reallyoperate, reveals a recent report.

Most businesses place an emphasis on malware detection. However, attackers are not being detected due to the tools falling under the category of legitimate, standard software, finds LightCyber Cyber Weapons 2016.

Although they do use malware in their attacks, the report found that hacking plays a more significant role in making threats. They also use remote access and admin tools, including LogMeIn, Ammyy Admin, and TeamViewer, to expand throughout the network before exploiting more computers to access confidential information.

Cyber criminals utilise well-known, and common networking tools in order to map out the network, monitor activity, and probe clients. They use such standard utilities as Windows Credential Editor.

Most organisations focus on detecting malware, but attackers are going undetected because most of the tools that they use are standard, legitimate software, according to LightCyber’s Cyber Weapons 2016 report.

Attackers use common and well-known networking tools to map out the network, probe clients and monitor activity. Standard utilities such as NCrack, Mimikatz and Windows Credential Editor can be used to steal or crack user credentials.

As cyber criminals become more sophisticated, it is up to organisations to fill cyber security jobs with those who are savvy and skilled enough to keep pace with modern cyber crime. The consequence of failing to do so could ultimately be a disaster in an age where customers are more aware and more cautious than ever when it comes to personal data.

 

Our accreditations & Partners

  • REC Member
  • VTC - Virtual Technology Cluster
  • Bloom Nepro
  • YPO
  • Crown Commerical Service
  • Disability Confident
  • ISO 9001
  • Armed Force Covenant
  • Cyber Essentials Plus
  • ISO 27001

Thanks

Success

Thanks

Success

Thank you for signing up to the acumin alerts.

Send CV

Send us your CV and have our recruiters match you to the ideal opportunities

Do you already have an account with us?

Log in

Want to have an account with us?

Register

Want to just send us your CV?

Upload only doc, docx, odt, pdf format file.

By submitting your registration and CV to us you are agreeing to join our database and to be contacted about relevant jobs industry communications. Please read our terms of business for more information.

Password reset

If you need a reminder for your password, fill out the field below

Log in

Access your account to edit your contact details, job alerts or to upload a new CV

Thank you

Success

Thank you for successfully uploading your CV.

Acumin Alerts

Success

Thanks for registering for Acumin alerts.

Acumin Alerts

Unfortunately your CV could not be uploaded

Please make sure your CV is one of the following file types: doc, docx, odt, pdf, rtf

Acumin Spam

Unfortunately your submission has been declared spam. Please try again.

Vacancy

Success

Thank you for submitting your vacancy.

Register

Create an account to register your contact details, sign up for job alerts and upload your CV

Success

Thanks for registering for Acumin alerts. To get the most out of Acumin's service why not register with us?

Upload only doc, docx, odt, pdf format file.
- Practitioner
- Commercial

I agree to the terms and conditions and to be contacted by recruiters:

I agree to receive marketing communications relevant to my job search:

I agree to receive Jobs By Email for the following professions:
- Business Continuity Management
- Counter Fraud
- Cyber Security
- Executive Management
- Governance & Compliance
- Information Security & Risk Management
- Penetration Testing & Digital Forensics
- Sales and Marketing
- Sales Engineering
- Security Management
- Technical Security
- Information/Risk Assurance
- Identity Management
- Application Security
- Security Architecture
- Dev/Sec Ops
- DV & SC Cleared Jobs
- Programme & Project Management
- CISO/CSO

Submit a Vacancy

Use the form below to submit a vacancy