Skip to content

Twitter Whistleblower Hearing

Twitter’s former head of security, Peiter “Mudge” Zatko gave damning testimony regarding Twitter’s alleged lack of cybersecurity measures to the Senate Judiciary Committee last Tuesday. Of course, it remains to be seen if lawmakers will do more than grumble about such inexcusable vulnerabilities.

Among the two hours of testimony, Zatko describes a disturbing unwillingness on the part of Twitter’s execs to secure the data of its 400 million users in a meaningful way.

After the embarrassing social engineering hack back in 2020 which led to the takeover of several high-profile accounts, Twitter hired Zatko to oversee security operations. He was brought on to control what he describes as a “ticking time bomb of security vulnerabilities” created by “10 years of overdue critical security issues, [without] making meaningful progress on them.”

The allegations made by Zatko would paint a comical picture if the implications weren’t so dire. Beyond the lax cybersecurity measures, we learn that Twitter possibly had a Chinese agent from the Ministry of State Security on the payroll. After notifying an executive about the possibility of foreign agents in the ranks, Zatko recounts that the executive responded with “Well, since we already have one, what does it matter if we have more?”

We also learn from the hearing that the cause of this debacle, in Zatko’s opinion, is Twitter’s utter lack of understanding in regard to the data it collects. “It doesn’t matter who has keys if you don’t have any locks on the doors,” he said.

In response to Zatko’s testimony, Twitter spokesperson Rebecca Hahn said that it “only confirms that Mr. Zatko’s allegations are riddled with inconsistencies and inaccuracies.”

Twitter’s response is interesting given the swathe of inquiries into Zatko’s background reported by Ronan Farrow in an article for the New Yorker. Purportedly, a number of research-and-advisory companies have approached former colleagues and individuals in the far reaches of Zatko’s professional sphere looking for information to discredit him.

The whistleblower testimony along with Twitter’s subsequent actions point to much more than simple ignorance of cybersecurity best practices. There appears to be a criminal disregard among Twitter’s execs for the data security of the platform’s users in favor of profit and the status quo. Those implicated should be held accountable beyond corporate fines that amount to little more than a scolding.

At least things are looking good for billionaire Musk’s attempt to renege on his agreement to acquire Twitter.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About VRX
VRX is a consolidated vulnerability management platform that protects assets in real time. Its rich, integrated features efficiently pinpoint and remediate the largest risks to your cyber infrastructure. Resolve the most pressing threats with efficient automation features and precise contextual analysis.

Threat Actors, Categories, and the Impact on Your Business

Intro

In this article I will cover some basics about the types of threat actors, threat categories, and their possible impact on your organization.

Let’s get to it!

Threats

Before looking at the types of threat actors, let me give you a quick rundown of what is considered a threat and how it impacts businesses.

By definition, a threat is an event (unplanned/not controlled by you/your systems) that has for its goal to exfiltrate (exfil), manipulate, or access your organization’s resources. This is tightly coupled with the loss of integrity, confidentiality, and availability of the said resources (CIA triad).

This can impact your organization’s information systems, your network(s), and other resources.

Impact

The impact on your organization can vary, however, it should always be considered as a major concern since it can target anything, from your org’s assets to the financials, and for example personal info of your employees. There’s no list that’s set in stone, but usually, the impact is about:

  • Loss of integrity and confidentiality – basically, your data or resources are less trustworthy, this further damages your org’s reputation, and business credibility
  • Damage to the customer relationship – this would impact your org’s relationship with its clients, losing some of them, thus resulting in a drop in profits/sales
  • Financial losses – your org is faced by financial losses, either directly (maybe you got ransomwared and are asked to pay up), or indirectly (the loss of manhours spent to repair and recover from the breach, etc.)
  • Operational impact – disruption to your operations; could even affect your entire org’s network
  • Business reputation – you take a hit to your org’s reputation, which can even result in losing existing clients and having troubles gaining new ones

Threat Actors

There are many different types of threat actors out there, however, the ones I am going to list here are what you will usually find in other resources on the Internet, handbooks, etc.

  • Script kiddies
  • Hacktivists
  • State-sponsored hackers
  • Insiders
  • Cyber terrorists
  • Industrial spies
  • Recreational (hobbyist) hackers
  • Organized/hacker groups
  • Ransomware gangs
  • APTs

Script kiddies – unskilled ‘hackers’ who usually run malicious scripts, and software in hopes of breaching a system/network. They don’t understand the tooling and its inner workings, they just acquire it and run it blindly against system(s). What you might call – spray and pray tactic.

Hacktivists – People who hack but are driven by political and/or ideological agenda. They are not novices and usually know what they’re doing, however, the whole motivation behind their attacks is driven by that agenda. This is usually manifested in the form of disabling or defacing websites, maybe even doxing and other similar stuff.

State-sponsored hackers – These guys are employed by their respective governments to breach and steal top-secret information, or to just damage the systems of other (competing) governments.

Insiders – These are YOUR employees, within your org, and are usually either terminated employees, disgruntled employees, or just good ol’ untrained staff. Generally, its hardest to hunt for these since they are already inside (detection is useless since they are legitimate users). They can also do a lot of damage to the org for the same reason as above – they have authorized access to your systems. Imagine a disgruntled employee ‘sharing’ their credentials with a hacker group they found on the darkweb, or something along those lines. Nasty.

Cyber terrorists – These individuals are similar to the hacktivists as they are also driven by political, or, in this case, religious agenda, but their goal is a bit different. As we all know their currency is fear, thus cyber-terrorists aim to create fear and/or larger disruptions to your systems/network(s).

Industrial spies – They attack companies for commercial purposes, they are usually hired by competing companies with the idea of attacking their competitors to steal confidential data such as financial records, employee information, your business strategy, or your proprietary data.

Recreational hackers – These hackers are the ones who hack systems so they can learn more, they don’t care about financial gain. They mostly exploit stuff they can for the said learning purposes.

Organized/group hackers – A merry band of hacker friends with a goal to exploit and hack stuff for pure profit. They will go for your SSNs, PIIs, health records, financials, credit card information, etc. Anything they can use for leverage to get their payout or steal directly.

Ransomware gangs – These guys are also an organized group of hackers, but they will usually deploy some kind of ransomware, once they breach you and enter your systems. After encrypting your data, they will ask for you to pay the ransom in order to get the data back. Typically, they focus on using compromised credentials to enter your systems. After that, they drop their payloads in form of specially crafted encrypting malware – ransomware. Some well-known ransomware groups include: Conti, Lapsus, Hive, LockBit, AlphV/BlackCat. (Try not to pay the ransom! Instead have backups and a recovery plan. Disconnect network-based devices where you can – I talked about this in previous articles, and even contact authorities.)

APTs or Advanced persistent threats – These are the stealthiest threat actors out there, and are typically a nation state itself, nation-state sponsored groups, or organized crime groups. They aim to breach your systems silently and establish themselves inside while being unnoticed by your detection systems. Their motivations are typically political or economic. The definition may vary from source to source, but the main thing for these groups is the fact they try to remain inside your systems undetected for as long as they can. Mean dwell-time for APTs (2018 data) is 71 days in the Americas, 177 days in the EMEA, and 204 days in the APAC region! APTs – Wiki

Both ransomware gangs and APTs might be grouped within the organized/group hackers, but I wanted to accentuate the distinction here. My article may not have the structure and strictness of a (hand)book, as my goal was not to bore you or enter a scholarly polemic, just provide you with the info straight on, so you can familiarize yourself with it and even take it further from here.

Threat Categories

Again, this might be structured differently in different sources, but I feel the following categorization is a good starting point, as a loose guideline of sorts.

Categories I included here are:

  • Network-based threats
  • Host-based threats
  • Application-based threats

Network-based Threats – This can pertain to: Information gathering/recon, Sniffing (eavesdropping), Spoofing, MITM – Man in the Middle attacks and session hijacking, DNS and ARP poisoning, Password-based attacks, DOS attacks, Firewall and IDS attacks

Host-based Threats – These would include: Malware attacks, arbitrary code execution, unauthorized access, privilege escalation, backdoors, physical security threats, footprinting

Application-based Threats – These can be (but are not limited to, of course – as the above examples too!): Improper input validation, authentication attacks, security misconfiguration, information disclosure, broken session management, buffer overflow attacks, SQLi, phishing, improper error handling and exception management

Conclusion

Think of this article as an extremely compact explanation on threat actors and categories. I hope it provides enough initial info that you can further build on! In the future articles, I will circle back to this topic and cover some of the stuff that’s mentioned here – or is related too – in more depth.

Until next time! Stay tuned.

Useful Links

https://nvd.nist.gov

https://cve.mitre.org

https://www.vulnerability-lab.com

https://cyber.gc.ca/en/guidance/introduction-cyber-threat-environment

advanced persistent threat – Glossary | CSRC (nist.gov)

Cover image by Martin Sanchez

 #threat-actors #threat-categories #impact

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About VRX
VRX is a consolidated vulnerability management platform that protects assets in real time. Its rich, integrated features efficiently pinpoint and remediate the largest risks to your cyber infrastructure. Resolve the most pressing threats with efficient automation features and precise contextual analysis.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×