In most cases, the initial compromise was a file that exploits a vulnerability 
in the filehandler.  The file is introduced either through email (phishing or 
spearphishing) or from a web-site (drive-by).  Once the bad guys have that 
access, they immediately capture local copies of all password hashes looking 
for a privileged account (preferably, in the case of Windows, the domain 
administrator) and then use that privileged account to spread.  In some cases, 
the bad guys use exploits that work through vulnerabilities in network-facing 
services - usually only for internal spread since the most vulnerable services 
are hidden behind firewalls.

Remote access services for employees to work from home, either with a company 
or private computer, have been a frequent attack point since the RSA 
compromise.  Once in as the employee, the bad guys follow the usual path.

On Jan 4, 2012, at 9:52 AM, Owen Densmore wrote:

Interesting mess a supposed gvt strategy contractor got themselves into:
     
http://it.slashdot.org/story/12/01/04/0630203/cleaning-up-the-mess-after-a-major-hack-attack

Bet: the initial compromise was not password/login based.  Most likely a social 
stunt or disgruntled employee .. or more lately, a hacked cell phone.

   -- Owen
============================================================
FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
lectures, archives, unsubscribe, maps at http://www.friam.org

Ray Parks
Consilient Heuristician/IDART Program Manager
V: 505-844-4024  M: 505-238-9359  P: 505-951-6084
NIPR: [email protected]<mailto:[email protected]>
SIPR: [email protected]<mailto:[email protected]> (send 
NIPR reminder)
JWICS: [email protected]<mailto:[email protected]> (send NIPR reminder)




============================================================
FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
lectures, archives, unsubscribe, maps at http://www.friam.org

Reply via email to