6 emerging cyber-threats you didn’t see in the news

Justin Fier, Director of Cyber Intelligence | Monday October 24, 2016

As an industry, the constant stream of cyber-attacks in the news can be overwhelming. It seems like every day we see front-page headlines announcing defaced websites or massive data breaches.

But what about the attacks that never make the news?

Here at Darktrace, our worldwide deployments find early-stage threats every day. While these developing threats never make the headlines, they often emerge in fascinating and unexpected ways.

Here’s a selection of what we’ve found for our customers:

  1. An attacker hacked into a biometric fingerprint scanner used for physical access at a major manufacturing company.
    This company used network-connected fingerprint scanners, allowing the attacker to use Telnet connections and default credentials to gain access. There were strong indiciators that the attacker was able to use the device to breach other servers.
  2. A cyber-criminal gained access to a video conferencing system of a multi-national corporation.
    Using a backdoor Trojan Horse, the attacker used six external computers to collect data from the camera, presumably in an attempt to steal video from confidential meetings.
  3. A new strain of malware forced the computers of a security company to visit explicit websites.
    Using random, algorithmically-generated websites, the attackers tried to plant incriminating evidence on the network by generating illegal web activity.
  4. A threat-actor hacked a ‘Lost and Found’ computer at a major European airport.
    To gain entry, the attacker used DNS servers, an essential capability for internet communication though rarely used for information transfer.
  5. A hacker tried to compromise an industrial power network using default codes.
    After penetrating the SCADA energy network, the attacker tried to establish a remote control link by using access codes listed as factory defaults online.
  6. A phishing email launched a ransomware attack on a non-profit charity.
    Using a fake email, the attacker claimed to have an invoice from a legitimate supplier. The attached pdf contacted a server in Ukraine and downloaded malware attempting to encrypt the non-profit’s network.

Our ‘immune system’ technology caught each attack at an extremely early stage, giving us a rare look at how modern threats are able to bypass legacy systems. Traditional security solutions can only detect attacks with pre-determined signatures. But in each case, threat-actors used signature-less attacks to blend into the noise of the network.

By harnessing the power of unsupervised machine learning, the Enterprise Immune System learned ‘normal’ for each of these networks, and detected the threats as anomalous behavior. Our threat analysts then determined the nature of the attack and counseled the organization to take appropriate action.

If you’re interested in learning the full story behind these emerging cyber-threats, check out our Threat Use Cases page.

We look forward to sharing more of our industry insights with you in the future.

Justin Fier

Justin is one of the US’s leading cyber intelligence experts, and holds the position of Director for Cyber Intelligence & Analytics at Darktrace. His insights on cyber security and artificial intelligence have been widely reported in leading media outlets, including the Wall Street Journal, CNN, The Washington Post, and VICELAND. With over 10 years of experience in cyber defense, Justin has supported various elements in the US intelligence community, holding mission-critical security roles with Lockheed Martin, Northrop Grumman Mission Systems and Abraxas. Justin is also a highly-skilled technical specialist, and works with Darktrace’s strategic global customers on threat analysis, defensive cyber operations, protecting IoT, and machine learning.