Ethical Hacking Can Beat Black Hat Hackers

The recent wave of publicised cyber attacks on computer systems across the world shows how some organisations are not doing enough to protect their systems against malicious hackers.  

If organisations had engaged the services of an ethical hacker then many of the vulnerabilities on their systems could have been found and fixed, rather than exploited.

There are many instances in which ethical hacking has successfully prevented a potential attack, but because of the sensitive nature of such information, few cases are made public. This anonymised example highlights the type of issues that can be uncovered by an ethical hacker, which can then be addressed by the client.

Putting on your Hacker Hat

There are typically three types of hacker: “black hat”, “grey hat” and “white hat”.

Black hat hackers are typically malicious; they operate illegally and attempt to breach or bypass security controls. Their motivation can be for personal, political or financial gain, or simply to cause havoc.

Grey hat hackers also try to find vulnerabilities in an organisation, and may then alert the organisation or publish the vulnerability.

Grey hats can sometimes sell the vulnerabilities to government or law-enforcement agencies, who may use them for questionable means in conflict or enforcement. The activities of a grey hat are not only questionable, but also seen as illegal because they are not given permission to conduct their operations.

White hat hackers use the same tools and techniques as their black and grey hat counterparts, but they are engaged and paid by organisations to find vulnerabilities. That’s why they are known as ethical hackers.

A contract and non-disclosure agreement (NDA) is usually signed between the ethical hacker and the organisation. This ensures that what they are doing is legal and that both parties are protected.

Ethical Hack-Attacks

Ethical hackers will typically follow a phased approach to conducting their tests. Depending on their methods, this will usually begin with a reconnaissance phase in which information is gathered and potential target systems are identified.

From there the computer network will be scanned (externally, internally or both, depending on the engagement) to examine it in more depth so as to identify any known vulnerabilities.

If vulnerabilities are found, an attempt to exploit them may follow, and ultimately access may be gained. An ethical hacker would also attempt to break into system that don’t necessarily have a known vulnerability, but are simply exposed.

Ethical hackers will then document their work and capture evidence to report back to the client. Hopefully they will find any vulnerabilities first, before they are exploited by others with less beneficent aims.

Becoming an Ethical Hacker

Ethical hackers gain their skills mainly through experience.

There are also many courses and certifications that teach ethical hacking, including the CREST Certified Tester, EC-Councils Certified Ethical Hacker, GIAC Penetration Tester and Offensive Security Certified Professional.

But these courses can’t teach everything. Organisations can differ vastly from one another, and the way to penetration-test each organisation is different and by no means prescriptive.

A good ethical hacker requires a great deal of skill and experience, not just the ability to blindly run a tool or script (also known as “script kiddie”).

Ethical hackers, like any other hacker, may also venture into the dark web to gain intelligence and learn about new exploits.

Asking for Trouble

One of the frustrations over this month’s ransomware attack on Microsoft’s Windows systems is that the software giant had already issued a patch in March, to protect PCs from this type of attack.

Despite the warnings, several organisations had not installed the patch, and others were running old Windows XP systems that Microsoft stopped supporting back in 2014. Windows 2003 systems were also vulnerable, having been unsupported since 2015.

This left these systems open to attack by ransomware known by a variety of names, including WannaCrypt and WannaCry. It encrypts files on infected systems, requiring a ransom for their un-encryption.

Another Attack

It has now been revealed that the same vulnerabilities that allowed this ransomware to infect systems has allowed the spread of a new threat, the Adylkuzz Cryptocurrency Mining Malware.

This ransomware is thought to have gone largely undetected until now because it isn’t destructive. Instead, it mines a cryptocurrency called Monero, which can generate income for the attackers.

Both outbreaks highlight the importance of practising diligent security and making sure that unsupported systems are upgraded or decommissioned.

The majority of advice so far has focused on appropriate defences such as the Australian Signals Directorate’s Essential Eight. This covers issues such as patching, application white-listing, appropriate firewall configuration, and using vendor-supported platforms.

But having a vigilant IT department that follows such guidance may not be enough.

Some focus should be given to how an ethical hacker can be used to help protect organisations against malicious attacks.

More than just an IT check

This approach to using an ethical hacker differs from the traditional internal IT team approach, as the focus is shifted from a defensive to an offensive mindset.

While the importance of solid defences can’t be understated, augmenting this with ethical hacking can greatly increase the resilience of an organisation’s networks. This approach tests the effectiveness of the controls in place and may identify previously unknown exposures.

But this approach is fairly limited to organisations. Engaging the services of an ethical hacker can cost tens of thousands of dollars, depending on the size of the job.

A typical home user would not have the resources to hire such help. In that case, adequate security controls and awareness would still be the best way to stop many attacks.

Microsoft’s Windows 10, for example, installs updates automatically, which can’t be deferred like previous versions. Windows 8 and 10 also come with Windows Defender pre-installed.
People should also make sure not to open suspicious emails, including those from unknown recipients. This will go a long way towards preventing infection.

The Future of Hack Attacks

Telstra’s latest security report says that 59.6% of future potential attacks in Asia and 52.6% in Australia will be due to external hackers. These attackers will use vulnerabilities (known or unknown) to carry out their attacks.

So there is merit in further research to determine how an ethical hacker can help organisations prevent attacks and infections from unknown vulnerabilities. The ability for a penetration test to identify vulnerabilities in advance before software vendors are aware and can release any patches would be invaluable.

Business-Standard:       ABC

You Might Also Read: 

Black Hat Europe Has Concerns About EU Metadata:

Hacker Holds Netflix To Ransom:

Russian Hackers Sow Disinformation Via Leaks:

The Reality is Everyone Hacks… Everyone:

 

« The Internet of Things Will Be Even More Vulnerable to Cyber Attacks
North Korea's Cyber War on Australia »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CERT-EU

CERT-EU

CERT-EU is a permanent Computer Emergency Response Team for the EU institutions, agencies and bodies.

CipherPoint Software

CipherPoint Software

CipherPoint Software provides data-centric auditing and protection solutions for securing unstructured information

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

Smarttech247

Smarttech247

Smarttech247 deliver a range of cyber security solutions, including cognitive security services using IBM Watson for Cybersecurity, SIEM, Compliance & Governance, and Penetration Testing.

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

Sweepatic

Sweepatic

The Sweepatic reconnaissance platform discovers and analyses all internet facing assets and their exposure to risk.

CryptoSec.info

CryptoSec.info

CryptoSec.info is a web resource focused on educating the beginners in the cryptocurrency space on how to properly secure their online assets from hackers and scammers.

Cloud GRC

Cloud GRC

Cloud GRC is an innovative cybersecurity company with solutions and expertise in Cybersecurity Strategies & Frameworks, Threat & Risk Assessment, Cloud Security, and Regulatory Compliance Requirements

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

A&O IT Group

A&O IT Group

A&O IT Group provide IT support and services including IT Managed Services, IT Project Services, IT Engineer Services and Cyber Security.

Surfshark

Surfshark

Surfshark is a cybersecurity company focused on developing humanized privacy & security protection solutions to secure people's digital lives.

ITC Federal

ITC Federal

ITC Federal delivers IT cybersecurity assessment services to support agencies in meeting their security strategies and federal security compliance goals.

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.

Cool Waters Cyber

Cool Waters Cyber

Cool Waters Cyber manage cyber security governance, risk and compliance.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.

Worksent Technologies

Worksent Technologies

Worksent is a Trusted white-label offshore support partner for MSPs and MSSPs.