Uncovering Covert Attack Communications Inside Your Network

Cyber attackers are slipping through perimeter defenses and hiding in the shadows and dark corners of networks. Malicious covert communications are key to their success. These hidden messages make long-running strategic attacks possible, and give attackers virtually unlimited opportunities to spy, spread and steal. Once attackers gain initial access to an organization’s network, they can take their time to orchestrate their next steps. With control over infected hosts, attackers have full control over their communications. That control allows them to encrypt their traffic, embed messages in seemingly normal communications, and use or modify legitimate applications to blend in with normal network traffic. Covert communications are specially crafted to bypass traditional perimeter security products that use signatures, reputation lists and malware sandboxes to identify threats. To do so, attackers can use…

Link to Full Article: Uncovering Covert Attack Communications Inside Your Network

Pin It on Pinterest

Share This