White Hat Female Hacker Leads The Way

Every 40 seconds, there is a cyber-attack; the criminals are getting smarter, their attacks are getting more and more sophisticated. Sherri Davidoff is the CEO of LMG Security a national consulting firm. She is a White Hat, meaning she hacks into computer systems, but for the good guys.

"We've seen this whole hacker economy evolve. And that means it's no longer 13-year-olds in their mom's basement that are hacking us," said Davidoff. "It is organised crime groups all over the world."

The data backs that up: according to the 2018 Verizon Data Breach Investigative Report, 50 percent of all breaches were carried out by organised criminal groups.

Davidoff, an MIT grad, was one of the first female hackers in an industry still dominated by men. From an office in downtown Missoula that looks out on snow-capped peaks, she and an all-female management team run a national consulting firm called LMG Security, which is hired by companies to test their security.

LMG Security tests companies for their cyber-security flaws. Often that means sending out emails to employees and calling, in hopes of getting them to click on a malware link. LMG then assists them in damage control after they've been hacked and helps them get cleaned up so they aren't repeat victims. They also hold security seminars for employees and executives, and help companies comply with cybersecurity laws and standards.

Anatomy of a Hack

LMG's war room is equipped with the same tools the bad guys, the "black hats," use. It has rows of computer screens, malware purchased on the dark web, and spoofing tools that disguise everything from phone numbers to voices. Davidoff gave NBC News an exclusive look as LMG's white hats prepared to hack an unnamed company to test for vulnerabilities.

"Attackers can send out 100,000 'phishing' emails," explained Davidoff, "and if one percent of people click on the link, that's 1000 people they've infected."

The team disguised their phone numbers and email addresses to look as if they were coming from inside the company, a tactic cyber criminals often use. Team members then sent out phishing emails with an address that looked like the messages were coming from the company's own IT department.

The fake emails, offering the chance to 'opt out' of a four-hour training, were meant to trick employees into clicking on a link that supposedly led to an online training site, but really just opened the door for hackers to get in.

If the employees took the bait and logged in, their passwords were captured. The "victims" then received an "error" message saying someone would be calling shortly. That's when Davidoff's team went to work with part two of the hack, the phone calls.

With numbers masked to look like they are coming from inside the company, Davidoff's staff called the targets, claiming to be tech support to help with the error. The callers, who sounded frighteningly realistic, instructed the victims to download a form that would allow the virus to infect their computer systems.

Some were suspicious and declined, but a few went ahead and clicked. It took mere minutes for Davidoff's crew to find a few takers, and have an open lane to infecting the entire company's system with a computer worm that could be absolutely devastating.

The white-hat team then repeated the process twice more for two other companies, with similar results.

Real life hacking situations look very similar to what Davidoff has set up, offices and all. Cyber criminals have gotten so good, she says, that cybercrime has turned into an entire underground industry, and criminals are increasingly employed by larger operations in a 9-to-5 job, only their job is to steal your information.

"In some cases, they're businesses," said Davidoff. "They are employing people that have families, and they don't see it as breaking into your organization. They see it as work. The same way you go to work, they go to work."

In fact, cybercrime has become so businesslike that if you were to buy one of these malicious programs on the anonymous part of the internet known as the "dark web," they come with a manual — and tech support. One dark web seller advertised "full support" and a refund if you weren't satisfied with your purchase.

The "dark web" is where cyber criminals go to purchase banking Trojans or other viruses that infect computer systems and can steal passwords, banking information, or documents that criminals can then hold for ransom.

These viruses are striking everywhere from small businesses to entire towns — and costing a lot of money in the process. The city of Allentown, Pennsylvania has its computer systems hacked in early 2018, compromising employee credential data and knocking out critical computer systems. The bill to clean up the mess left behind by the hackers and to ensure that it didn't happen again? Nearly 1 million dollars.

How Consumers Can Combat the Hacks

The number one thing you can do to protect yourself from cybercrime, according to Davidoff, is "think before you click." She advises against clicking on any emails that don't seem familiar.

Number two is to back-up your data, so that if you do get hacked you won't lose all of the important files you have in your system. Number three is enable two-factor authentication on things like your email accounts and mobile banking apps. That means using a second credential in addition to your password, like a code generated by an app on your smartphone. Davidoff says it's a simple thing that everyone who uses the internet should do.

With the threats only increasing every year, Davidoff has been busy. She runs a second company from the same Missoula office called Brightwise, which specializes in cybersecurity training. Her life, from the halls of MIT to running her own company and having children in the mountains in Montana, is now the subject of a book out this month called "Breaking and Entering: The Extraordinary Story of a Hacker called Alien."

She does not see herself slowing down anytime soon and keeps a constant eye on the threats of the future. "The watches you wear, any coffee pots or refrigerators that are smart that you plug in, all of these are computers," she said. This means that all of those are, potentially, hackable. Davidoff says that we are entering a time period where homes can get infected with malicious software, and cyber-criminals will eventually hold our own appliances for ransom.

"That's where we're headed in the next decade," Davidoff said. "Sleep tight."

NBC News:

You Might Also Read:

Are Women Better At Cyber Security?:

Darktrace CEO Says Cyber Security Is A Global Arms Race:

 

« Dubai Police Hold 2nd Annual Cybersecurity Challenge
Military Cyber Training Methods »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ThetaRay

ThetaRay

ThetaRay’s solution for Industrial cyber security protects against unknown cyber-attacks that target industry and critical infrastructure.

X-act Forensics

X-act Forensics

X-act forensics are computer forensic experts with experience in cases of computer fraud, intellectual property theft, and social networking cases.

Aves Netsec

Aves Netsec

Aves is a deceptive security system for enterprises who want to capture, observe and mitigate bad actors in their internal network.

CryptoCodex

CryptoCodex

Cryptocodex has developed Counter-Fight, the most advanced, yet simple to implement, counterfeit detection system.

ISEC7 Group

ISEC7 Group

ISEC7 Group is a global provider of mobile business services and software solutions. The company was one of the first movers in mobilising company and business processes.

6point6

6point6

6point6 is a technology consultancy with strong expertise in digital transformation, emerging technology and cyber security.

CloudVector

CloudVector

CloudVector's API Detection & Response platform is the only API Threat Protection solution that goes beyond the gateway to provide Shadow API Prevention and Deep API Risk Monitoring and Remediation.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Conduent

Conduent

Conduent delivers mission-critical technology services and solutions on behalf of businesses and governments. Solution areas include digital risk and compliance.

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance combines insurance expertise with cybersecurity and data talent to deliver clear, effective solutions to protect you for the cyberrisks of today—and tomorrow.

World Informatix Cyber Security (WICS)

World Informatix Cyber Security (WICS)

World Informatix Cyber Security provides a range of cyber security services to protect valuable information assets to global business and governments.

GoVanguard

GoVanguard

GoVanguard is an boutique information security team delivering robust, business-focused information security solutions.

Sure Valley Ventures

Sure Valley Ventures

Sure Valley Ventures is an entrepreneur led venture capital fund focused on helping software entrepreneurs grow and scale businesses that will have a global impact.

DeXpose

DeXpose

DeXpose is a hybrid dark/deep web monitoring and attack surface mapping platform to help you find compromised data or exposed assets related to your organization way before threat actors.

SafeLiShare

SafeLiShare

SafeLiShare’s data security platform unifies encryption strategies for organizations with hybrid and multi-cloud infrastructures, ensuring data is secure regardless of its location.

INT3L

INT3L

The INT3L group (formerly Defentek) is a provider of national security and intelligence solutions, systems and services.