Cymmetria

Cymmetria

Crowdsourcing The Dark Web: A One-Stop Ransomware Shop

(Published originally on Dark Reading) Ransom attacks are at an all-time high; more and more criminals are using common tools to steal data and extort data owners. But this type of attack can be risky for the cybercriminal because, unlike stealthy advanced attacks, such operations require interaction with the victim. Furthermore, even if the victim …

Crowdsourcing The Dark Web: A One-Stop Ransomware Shop Read More »

Anonymous’ ‘Hack Israel Day’ Could Impact the Entire World

(Originally published on re/code) Israel was hit by a massive cyber offensive this week. But unlike other attacks (APTs, criminal campaigns, etc.) to hit the nation, this one has been announced in advance. It’s Anonymous’ annual OpIsrael attack, which has been taking place on April 7 every year since 2013. According to most Israeli researchers, the attack …

Anonymous’ ‘Hack Israel Day’ Could Impact the Entire World Read More »

The Ukraine power grid hack: Why did the attackers succeed?  

Last December, the lights went out in the Ivano‐Frankivsk region of Ukraine, and over 225,000 people were left without electricity for several hours. This blackout was caused by advanced attackers, presumably from Russia, who managed to disconnect 145 substations from the power grid.   E‐ISAC and SANS ICS published a detailed analysis of this attack. The analysis …

The Ukraine power grid hack: Why did the attackers succeed?   Read More »

APT attacks and false flag tactics: How can we spot the fakes?

The false flag tactic originated in naval combat in the days of yore. Flags were used to communicate between fleet assets before and during combat; a ship’s identity was important, especially when gun smoke filled the air. Flying the enemy’s banner during combat, along with flags displaying false messaging, could confuse and mislead the enemy. …

APT attacks and false flag tactics: How can we spot the fakes? Read More »

Researchers have created a honeyclient capable of on-the-wire detection

Attackers switch between different types of malware, move their exploit kits between servers or constantly morph the traffic to look legitimate. By the time relevant data is collected and transformed into a signature for a defender’s NIDS, the attacker might have already breached the network and reached their objective. According to a new study by researchers at …

Researchers have created a honeyclient capable of on-the-wire detection Read More »

The 5 best events you might have missed at the RSA and BSides(SF) conferences

Last week was great for Cymmetria: our team traveled to San Francisco for the RSA and BSides conferences, where we met security vendors, researchers, cyber deception enthusiasts, and potential clients. Many of them came to catch a glimpse of MazeRunner and learn about advanced cyber deception from our specialists. We also recieved media attention, and Israel’s Geektime chose …

The 5 best events you might have missed at the RSA and BSides(SF) conferences Read More »

Scroll to Top