How one hacked laptop led to an entire network being compromised

Discussion in 'malware problems & news' started by guest, Dec 14, 2018.

  1. guest

    guest Guest

    How one hacked laptop led to an entire network being compromised
    December 14, 2018
    https://www.zdnet.com/article/how-one-hacked-laptop-led-to-an-entire-network-being-compromised/
     
  2. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Which leads to the question of why security measures were not in place to treat laptops as any other external device connecting to the corp. network? At a minimum, the network connection should have been blocked until the device was scanned by the in-house AV software.
     
  3. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,065
    Location:
    Canada
    Good point indeed. The company I work for would have had the laptop put to a stand still mere minutes after a similar type infection. Chances are very good the phishing email would not have made it to the inbox either, because of the perimeter defenses they incorporate. Employees are made to take online courses for this type of thing as well as other cyber security courses, and they are "tested" routinely by the company with mock phishing emails sent to them. If an employee falls for it, they are made to re-take the course.
     
  4. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Yes but besides this, any high quality EDR system should have picked up malicious activity performed by this laptop on the network. So this is clearly a case of either a lack of EDR, or usage of a low quality EDR. And with EDR I mean tools mentioned in link:

    https://attackevals.mitre.org/evaluations.html
     
  5. longshots

    longshots Registered Member

    Joined:
    Oct 20, 2017
    Posts:
    537
    Location:
    Australia
    And yet again the weakest link theory has been proven. The lack of some businesses to apply correct network security procedures is always a bonus, but there's no substitute for stupid people.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.