Ethical Hacking Can Beat Black Hat Hackers

The recent wave of publicised cyber attacks on computer systems across the world shows how some organisations are not doing enough to protect their systems against malicious hackers.  

If organisations had engaged the services of an ethical hacker then many of the vulnerabilities on their systems could have been found and fixed, rather than exploited.

There are many instances in which ethical hacking has successfully prevented a potential attack, but because of the sensitive nature of such information, few cases are made public. This anonymised example highlights the type of issues that can be uncovered by an ethical hacker, which can then be addressed by the client.

Putting on your Hacker Hat

There are typically three types of hacker: “black hat”, “grey hat” and “white hat”.

Black hat hackers are typically malicious; they operate illegally and attempt to breach or bypass security controls. Their motivation can be for personal, political or financial gain, or simply to cause havoc.

Grey hat hackers also try to find vulnerabilities in an organisation, and may then alert the organisation or publish the vulnerability.

Grey hats can sometimes sell the vulnerabilities to government or law-enforcement agencies, who may use them for questionable means in conflict or enforcement. The activities of a grey hat are not only questionable, but also seen as illegal because they are not given permission to conduct their operations.

White hat hackers use the same tools and techniques as their black and grey hat counterparts, but they are engaged and paid by organisations to find vulnerabilities. That’s why they are known as ethical hackers.

A contract and non-disclosure agreement (NDA) is usually signed between the ethical hacker and the organisation. This ensures that what they are doing is legal and that both parties are protected.

Ethical Hack-Attacks

Ethical hackers will typically follow a phased approach to conducting their tests. Depending on their methods, this will usually begin with a reconnaissance phase in which information is gathered and potential target systems are identified.

From there the computer network will be scanned (externally, internally or both, depending on the engagement) to examine it in more depth so as to identify any known vulnerabilities.

If vulnerabilities are found, an attempt to exploit them may follow, and ultimately access may be gained. An ethical hacker would also attempt to break into system that don’t necessarily have a known vulnerability, but are simply exposed.

Ethical hackers will then document their work and capture evidence to report back to the client. Hopefully they will find any vulnerabilities first, before they are exploited by others with less beneficent aims.

Becoming an Ethical Hacker

Ethical hackers gain their skills mainly through experience.

There are also many courses and certifications that teach ethical hacking, including the CREST Certified Tester, EC-Councils Certified Ethical Hacker, GIAC Penetration Tester and Offensive Security Certified Professional.

But these courses can’t teach everything. Organisations can differ vastly from one another, and the way to penetration-test each organisation is different and by no means prescriptive.

A good ethical hacker requires a great deal of skill and experience, not just the ability to blindly run a tool or script (also known as “script kiddie”).

Ethical hackers, like any other hacker, may also venture into the dark web to gain intelligence and learn about new exploits.

Asking for Trouble

One of the frustrations over this month’s ransomware attack on Microsoft’s Windows systems is that the software giant had already issued a patch in March, to protect PCs from this type of attack.

Despite the warnings, several organisations had not installed the patch, and others were running old Windows XP systems that Microsoft stopped supporting back in 2014. Windows 2003 systems were also vulnerable, having been unsupported since 2015.

This left these systems open to attack by ransomware known by a variety of names, including WannaCrypt and WannaCry. It encrypts files on infected systems, requiring a ransom for their un-encryption.

Another Attack

It has now been revealed that the same vulnerabilities that allowed this ransomware to infect systems has allowed the spread of a new threat, the Adylkuzz Cryptocurrency Mining Malware.

This ransomware is thought to have gone largely undetected until now because it isn’t destructive. Instead, it mines a cryptocurrency called Monero, which can generate income for the attackers.

Both outbreaks highlight the importance of practising diligent security and making sure that unsupported systems are upgraded or decommissioned.

The majority of advice so far has focused on appropriate defences such as the Australian Signals Directorate’s Essential Eight. This covers issues such as patching, application white-listing, appropriate firewall configuration, and using vendor-supported platforms.

But having a vigilant IT department that follows such guidance may not be enough.

Some focus should be given to how an ethical hacker can be used to help protect organisations against malicious attacks.

More than just an IT check

This approach to using an ethical hacker differs from the traditional internal IT team approach, as the focus is shifted from a defensive to an offensive mindset.

While the importance of solid defences can’t be understated, augmenting this with ethical hacking can greatly increase the resilience of an organisation’s networks. This approach tests the effectiveness of the controls in place and may identify previously unknown exposures.

But this approach is fairly limited to organisations. Engaging the services of an ethical hacker can cost tens of thousands of dollars, depending on the size of the job.

A typical home user would not have the resources to hire such help. In that case, adequate security controls and awareness would still be the best way to stop many attacks.

Microsoft’s Windows 10, for example, installs updates automatically, which can’t be deferred like previous versions. Windows 8 and 10 also come with Windows Defender pre-installed.
People should also make sure not to open suspicious emails, including those from unknown recipients. This will go a long way towards preventing infection.

The Future of Hack Attacks

Telstra’s latest security report says that 59.6% of future potential attacks in Asia and 52.6% in Australia will be due to external hackers. These attackers will use vulnerabilities (known or unknown) to carry out their attacks.

So there is merit in further research to determine how an ethical hacker can help organisations prevent attacks and infections from unknown vulnerabilities. The ability for a penetration test to identify vulnerabilities in advance before software vendors are aware and can release any patches would be invaluable.

Business-Standard:       ABC

You Might Also Read: 

Black Hat Europe Has Concerns About EU Metadata:

Hacker Holds Netflix To Ransom:

Russian Hackers Sow Disinformation Via Leaks:

The Reality is Everyone Hacks… Everyone:

 

« The Internet of Things Will Be Even More Vulnerable to Cyber Attacks
North Korea's Cyber War on Australia »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The Networking People (TNP)

The Networking People (TNP)

TNP supplies independent advice allowing large organisations to design, build and operate their own networks independently of the established telecoms companies.

Perkins Coie LLP

Perkins Coie LLP

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

Platin Bilişim

Platin Bilişim

Platin Bilisim is an IT Security company providing consultancy, solutions and operational support services.

Information Systems Security Partners (ISSP)

Information Systems Security Partners (ISSP)

ISSP is a specialized system integrator focused on the information security needs of its corporate clients and providing best in class products and services for securing organizational information.

Featurespace

Featurespace

Featurespace is a world-leader in Adaptive Behavioural Analytics and creator of the ARIC platform for fraud and risk management.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

WisePlant

WisePlant

WisePlant's portfolio of solutions and services includes process measurement, secure automation, industrial cybersecurity, functional safety and more.

Locuz

Locuz

At Locuz, we’ve made it our mission to help businesses like yours create an actionable digital strategy.

Insight Enterprises

Insight Enterprises

Insight is a leading solutions integrator, helping you navigate today’s ever-changing business environment with teams of technical experts and decades of industry experience.

ThreatFabric

ThreatFabric

ThreatFabric integrates industry-leading threat intel, behavioral analytics, advanced device fingerprinting and over 10.000 adaptive fraud indicators.

Scality

Scality

Scality storage unifies data management from edge to core to cloud. Our market-leading file and object storage software protects data on-premises and in hybrid and multi-cloud environments.

Emircom

Emircom

Emircom is one of the Middle East's leading independent providers of IT infrastructure services, helping clients to drive growth and deliver measurable outcomes.

Cyber Qubits

Cyber Qubits

Cyber Qubits is a cybersecurity training and consulting company focused on developing the next generation of cybersecurity professionals.

Dedagroup (Deda)

Dedagroup (Deda)

Dedagroup provide application solutions and IT services to bring innovation at the core of business processes.