Security & Fraud

Hackers Increasing Sophistication With Secondary Attacks

Hackers are growing much more sophisticated; a new report shows that when incident response teams thwart an attack, they are finding another attack waiting in the wings.

According to a report in citing a new Carbon Black study of 37 big incident response teams that use its security tool, the majority found a second command and control infrastructure waiting in the wings.

“Sixty-four percent found a secondary C2 on sleep cycle,” says Tom Kellermann, chief security officer at Carbon Black, in the report. “This highlights how the adversary has gone from burglary to home invasion: they intend on staying and will take counter attempts... and could get destructive.”

According to the report, Russia and China are behind the lion’s share of attacks, with 81 percent of incident response professionals pointing to Russia and 76 percent citing China. Close to 80 percent of survey respondents said the financial sector was the biggest target for attacks, followed by healthcare and then government agencies. The research also found that nearly 60 percent of the attacks involve the attack moving from the initial machine of the victims to others within the organization. All of those surveyed said hackers have used the Windows Management Interface as their way to attack, among other tools.

“The uptick of WMI is concerning,” said Kellermann in the report. “It speaks to the level of sophistication [being used] to colonize that infrastructure.” The main purpose of the hackers: getting access to the supply chain of a company. The executive said a good way to defend from these types of attacks that have a secondary attack is to investigate and hunt the hackers quietly so they don’t have time to rework the attack. “The number one thing we need to evolve in as defenders is to become more quiet and clandestine in how we hunt,” he said. “Deciding when to reveal oneself is critical, as counter-incident response measures as destructive attacks are becoming the norm.”



New forms of alternative credit and point-of-sale (POS) lending options like ‘buy now, pay later’ (BNPL) leverage the growing influence of payments choice on customer loyalty. Nearly 60 percent of consumers say such digital options now influence where and how they shop—especially touchless payments and robust, well-crafted ecommerce checkouts—so, merchants have a clear mandate: understand what has changed and adjust accordingly. Join PYMNTS CEO Karen Webster together with PayPal’s Greg Lisiewski, BigCommerce’s Mark Rosales, and Adore Me’s Camille Kress as they spotlight key findings from the new PYMNTS-PayPal study, “How We Shop” and map out faster, better pathways to a stronger recovery.