Attack of the Cyber Vampires-phishing at the White House - Exabeam

Attack of the Cyber Vampires–phishing at the White House

Published
April 09, 2015

Author
Mark Seward

OK — my apologies up front for the headline but the analogy is too apt not to use. In Bram Stoker’s 1897 book Dracula, there’s a famous scene where Dracula is outside a castle window looking into the character Mina’s bedroom. He uses his powers to wake her from an erotic dream and still in a trance she walks to the window. Dracula is pretty happy because the only way a vampire can enter the castle is by being invited and Mina’s the best looking woman in Transylvania at the moment. Of course we all know that beguiled by Dracula, she opens the window and that’s his invitation to enter. We all know what happens next; lots of blood, torches and pitchforks, etc. etc.

It’s hard to imagine some form of social engineering in 1897. The way the vampire phishes for his victim’s blood isn’t far from the way the cyber criminals phish victims for data. Every organization (commercial or civilian) has a Mina that can be phished and tempted to open the window. No amout of cyber vampire awareness training would have made a difference. There are too many cyber vampires everywhere that aim to suck data from the organization. Lately, for the government the cyber vampires seem to be from Russia.

The CNN article on-line, How the U.S. Thinks Russians Hacked the Whitehouse is a case study in how cyber vampires get permission for victims to enter the network using credentials and steal valuable data (the life blood of the organization). According to the article, “…investigators believe the White House intrusion began with a phishing email that was launched using a State Department email account that the hackers had taken over, according to the U.S. officials.” The phish was the Russians asking Mina to open the window to gain access to the data.

The right “Mina” in this case is the one that had access to, “…real-time non-public details of the president’s schedule. While such information is not classified, it is still highly sensitive and prized by foreign intelligence agencies…”  Of course there was another Mina at the State Department who likely assisted the cyber Dracula, and was turned into an unwitting ally to help him suck data out of the White House. As was stated in the CNN article, “Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system.”

Your cyber defenses can’t stop Mina from opening that window and letting Dracula in, but once inside, user behavior intelligence becomes that next layer of defense that can detect a compromised Mina’s movements and expose her (and ultimately his to the sunlight. Please see my blog for information on the State Department Breach and how user behavior intelligence detects cyber vampires and their proxy vampires.

Recent Information Security Articles

Five Steps to Effectively Identify Insider Threats

Read More

Detecting the New PetitPotam Attack With Exabeam

Read More

The Challenges of Today’s CISO: Navigating the Balance of Compliance and Security

Read More

Human Managed Selects Exabeam to Drive Faster Decision-making

Read More

Exabeam Successfully Completes the Annual System and Organization Controls SOC 2 Type II Audit

Read More



Recent Information Security Articles

SIEM Gartner: Get the 2021 Magic Quadrant Report

Read More

Five Steps to Effectively Identify Insider Threats

Read More

Detecting the New PetitPotam Attack With Exabeam

Read More

The Challenges of Today’s CISO: Navigating the Balance of Compliance and Security

Read More

Human Managed Selects Exabeam to Drive Faster Decision-making

Read More