Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

No Malware, No Compromise?

by Richard Bejtlich
June 18, 2013
in Cybersecurity
Reading Time: 3 mins read
A A
Share on FacebookShare on Twitter

While conducting incident response work, Mandiant encounters security teams and executives who seem to focus on malware as the defining feature of a compromise. These groups think that the scope of an incident depends on knowing where the intruder installed malware. Knowing where malware was used, and how it was used, is indeed important for effective incident response. Unfortunately, knowledge of malware, however complete, is only half the picture.

When detecting, responding to, and containing intrusions, the “scope” of the incident is a key consideration. Scope refers to the extent of the compromise. How much of the enterprise is under adversary control? How much of the enterprise did the intruder access? How much data was viewed, stolen, altered, or otherwise manipulated? The answers to these questions will guide the tempo and nature of any remediation activity.

Mandiant’s previous reporting on incident scope and malware prevalence indicate that intruders use malware to reach approximately half of all the systems with which they interact, on average. In other words, if you find every single system compromised by malware, and use no other means to determine incident scope, you will miss 50% of the intrusion.

Missing that 50% has terrible consequences. An enterprise that uses a malware-focused remediation quickly learns that they have failed to remove the intruder. Repeated malware-focused remediation efforts will continue to fail.

It makes sense from the intruder’s point of view to abandon malware as quickly as possible. It’s much more effective for the intruder to adopt the same means of access that regular employees use – credentials, virtual private network access, and the like. These means of access are supported by the organization and difficult to audit for unauthorized access, depending on the size and complexity of the organization.

The bottom line is that scoping incidents requires looking not just at malware, but at all indicators of compromise. Only by taking a more holistic approach will organizations rapidly and effectively detect, respond

Listen to internet radio with Federal Technology Insider on BlogTalkRadio

This piece originally appeared on Mandiant’s M-Unition blog on April 22nd, 2013.  Richard Bejtlich is a world-renowned security expert and Mandiant’s Chief Security Officer. 

Tags: APTAPTscyber securitycybersecurityintrusion detectionmalwareMandaintRichard BejtlicTao SecurityVirtual Private Network SecurityVPN Security

RELATED POSTS

Design Secure Application Software That Transforms Government Agencies
Civilian

Design Secure Application Software That Transforms Government Agencies

June 28, 2022
Contributed Articles

DMARC: A Critical Tool for State and Local Government Cybersecurity

June 21, 2022
Balancing Security and Customer Experience for Digital Government
CX Service and Delivery

Balancing Security and Customer Experience for Digital Government

June 20, 2022
Please login to join discussion

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5387 shares
    Share 2155 Tweet 1347
  • The Future for the Air Force Depends on Agility and Resilience at the Edge

    87 shares
    Share 35 Tweet 22
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    42 shares
    Share 17 Tweet 11

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us