Site   Web

February 9, 2016

New Report Outlines Who’s Attacking Online and How

ICIT Provides Look at Groups Behind Cyber Attacks


When it comes to cyber-security, education is paramount.

ICITA lengthy new report issued by the The Institute for Critical Infrastructure Technology takes an extensive look at the state of cyber-security and the threats that are posed, daily, against systems. The report walks readers through characteristics and intricacies of hackers and hacker groups.

The idea behind the report, aptly subtitled Know Your Enemy, is to shed light on how these groups work and where weaknesses can be targeted.

“Even with multi-factor authentication and cyber-security protocols in place, breaches will happen. Optimized cybersecurity strategies will use early warning mechanisms such as behavioral analytics and behavioral biometrics coupled with multilayered encryption. This ‘Tar Pit’ method will slow down a breach, alert the proper administrator and minimize threat,” the report explains.

“That said, even the most robust cybersecurity strategy is useless if the bad actor has obtained legitimate admin credentials, therefore education is essential. Spear Phishing is one commonality shared by a majority of hacking events. Spoofed URL’s, watering hole attacks etc. are all dependent on getting the target to click on a link or open an attachment that carries the malicious code that will infect one’s network; the objective is to train staff to identify these subtleties that will have catastrophic impact.”

One of the interesting things about the report is its breakdown — by various countries — of threat groups. Authors James Scott and Drew Spaniel provide insight on these groups with some explanation on their modus operandi.

“This report,” Scott stated in an e-mail, “is sure to be the cyber-security journalist’s new research counterpart and the policy advisor’s go-to handbook for quick referencing and attribution details.”


W. Brice McVicar is a staff writer for SiteProNews.

Submit a Comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title="" rel=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Please leave these two fields as-is:

Protected by Invisible Defender. Showed 403 to 3,948,712 bad guys.