Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
Dec. 2012/Volume 14 / No. 10

Marcus Ranum chat: Network threat detection and wireless attacks

Marcus Ranum: The other day over lunch you were telling me about a rather amazing incident that you were dealing with. I understand that you can’t get too detailed about some parts of it, but what can you tell us? Aaron Turner: I guess the first surprising thing we found was that there were at least three different adversaries on the network, each attacking a different aspect of the infrastructure. One group was after the crown jewels—and was very focused and organized—another was picking up the crumbs of the ‘A Team,’ and another was running a payment card harvesting operation focused on the organization’s P-Cards [purchasing cards] associated with the organizations bank accounts. The most interesting thing about the ‘A Team’ is that essentially, we found evidence that this group of sophisticated attackers was using wireless communications capabilities to not only bypass the organization’s security controls, but they were doing so to accelerate the exfiltration of information from the organization. Think of it as the attackers ...

Features in this issue

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close