You’re under attack and you don’t even know it.

cyber security magazine logo

Cyberattacks can happen to anyone; no-one is immune to them. Organizations are especially vulnerable to attacks, including data breaches, with almost 2 billion records leaked in January 2019 alone. Malware attacks were up 200% in 2019, of which this includes ransomware attacks. This means security is a must, not just a recommendation. However, security software such as Network Access Control (NAC), End-point security (EPS) and antivirus software are no longer adequate in protecting against malicious actors. You could be under attack and not one of your security measures would be able to detect it, let alone help you. Why? Rogue devices.

Rogue devices are malicious by nature. They are devices that have intentionally been compromised to carry out cyberattacks including data breaches and malware and ransomware attacks. Manipulating a peripheral device with a small computer, such as the BeagleBone Board, allows bad actors to remotely gain access to an organization’s network by creating an out of band connection to bypass an air-gapped network. From here, data can be extracted, or malware/ransomware can be installed without the end-user knowing, causing organizations to be vulnerable to both exfiltration and injection. Often, rogue devices help attackers perform man in the middle (MiTM) attacks, whereby the device intercepts the message from the victim to the entity. The consequences are impactful, and these attacks can even allow attackers to bypass biometric authentication…

July 17th, 2020