Five Hacking Techniques That Expose Your Company to Ransomware

hacker methods

While phishing, spearphishing, and malicious web links are probably among the most common attacks used by hackers to infiltrate an organization, some old-school techniques still exist—and are just as effective as hacking techniques due to the focus on more modern methods.

Here are five “forgotten” attack methods to watch for and ensure your organization is safe from unauthorized access.

 

The irresistible USB drive

As a curious human, what would you do if you found a USB drive lying on the ground? Most people would pick it up and insert it into a computer to see its contents, but by doing so, you may just have infected your computer and/or network with a virus. Hackers prey on human nature, and a discarded or lost thumb drive is a tempting treasure.

There are two popular methods that hackers can use: –opening a document on the thumb drive and using a “rubber ducky.”

Opening a Word document with an enticing file name prompts the user to enable macros. Enabling macros allows malicious code in the file to run on the computer, installing viruses, capturing keystrokes, or creating backdoors for later use. 

A “rubber ducky” is a small computer that looks just like a USB drive and tricks the computer into thinking it is a new keyboard or harmless device it needs to install, thus bypassing any anti-virus or other defenses.

One way to combat these tricks is to disable USB drives on laptops and computers. Another is to educate users on the dangers of seemingly innocuous things such as picking up a thumb drive and plugging it into a computer.

hacking techniques - usb drive

Unsecured network access points

Hollywood loves this trick—someone sneaks into an office building and either gains access to a server room or networking closet and can hack the entire network by plugging in a laptop or accessing a conveniently-located terminal and furiously typing away while a timer runs.

While it adds to the drama of any good flick, having unsecured wireless access points is never a good idea. Are you properly securing all of your switches and networking equipment? An unlocked network closet could allow anyone in to cause damage to equipment or use a switch port to access the network. LAN turtles are particularly nasty devices that are likely to go unnoticed while gathering data, installing software, or facilitating man-in-the-middle (MITM) attacks anywhere on the network.

Network admins should consider restricting physical access to networking equipment at all times, disabling ports that are not in use, and restricting a general work area’s network access by MAC addresses.

The hidden computer

Monitoring systems and lobby kiosks are two examples of computers used but never touched. Or are they? We occasionally see stories of overnight staff or bored security guards causing security breaches from poor internet use. Often, these out-of-the-way systems never receive patches or upgrades, leaving vulnerabilities for someone to exploit. Once infected, these computers can repeatedly wreak havoc on a network and can be extremely difficult to track down. Having good patch management procedures in place can help, but utilizing security controls across all devices is a better solution.

hacker spy

A lost or stolen laptop

Laptop owners have probably left a laptop in a car at some point in their lives, whether purposefully for a grocery run or accidentally in a rental car. A laptop can give thieves access to confidential resources, possibly even VPN access to a corporate network if stolen. It is essential to have security measures to restrict automatic VPN connections, encrypt hard drives, and require strong passwords to wake or access laptops. Using multi-factor authentication (MFA) is another common practice to prevent unauthorized access.

In this scenario, “Bob” left his laptop in a rental car when returning it to the agency. He didn’t immediately report it but was relieved when the rental company called him the next day and said they had it. Bob plugged his laptop back into the network at work and unleashed a virus. He had also unknowingly shared confidential blueprints because they were unencrypted. Better security practices for mobile or portable devices can prevent this nefarious activity.

Free Wi-Fi, Sweet!

People who travel for work are likely at higher risk for cybersecurity crimes than those who do not. Finding a place to connect to Wi-Fi between meetings or during lunch is common, but not all wireless networks are safe. Workers conducting business on corporate laptops should not connect to unsecured wireless networks of any kind. They should understand bad actors can be lurking nearby with fake wireless networks designed to steal your information.

Securely tethering a laptop to a phone or corporate mobile hotspot is a safer way to access the internet or VPN resources while in public places and generally will be faster, too.

As IT professionals, we must do everything we can to safeguard ourselves against cyber threats. We find ourselves trying to keep up with new technologies and attack vectors and often forget some of the most basic security principles.

More Cybersecurity Articles

Types of Insider Threat

Types of Insider Threat

How many types of insider threats are there? One? Three? Six? All of the above is likely correct, although most people would indicate one commonality in their answers: humans. Most would also separate this human threat into three categories: compromised, negligent,...

Mobile Security

Mobile Security

[Disclaimer – Global Data Vault has no affiliation with MDM vendors, does not endorse, and is not endorsed by MDM/EMM/UEM vendors] We all know that mobile devices are increasing in popularity. In 2018, a Gartner study indicated over 20 billion mobile devices were...

Does a Data Protection Audit Make You Nervous?

Does a Data Protection Audit Make You Nervous?

 Don't let the idea of a data protection audit make you nervous. While the word "audit" is often associated with something negative—tax audit, licensing audit, etc.—a data protection audit can produce positive results and show areas of improvement before potentially...

Is Tik Tok as Dangerous as People Believe?

Is Tik Tok as Dangerous as People Believe?

  The following post is a summary of a blog article published by our cybersecurity partner BitLyft with additional comments by this author.  We have all seen the popularity of TikTok explode in recent months, perhaps due to shelter-in-place orders and people...

Disaster Recovery as a Service

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *