EXECUTIVE SUMMARY:
At the mention of island hopping, you’re likely dreaming about adventures in Hawaii, the Caribbean, or similar destinations with majestic views and white-sand beaches. In the context of cyber security, island hopping refers to a sophisticated type of cyber attack. This technique is used by attackers as a means of circumventing advanced cyber security measures deployed by large organizations.
An island hopping attack occurs when cyber adversaries pursue access to a company through a circuitous route. Instead of directly targeting the intended victim organization, the attackers will ‘hop’ through a series of intermediary steps in order to achieve their objectives.
For instance, cyber adversaries may compromise a large organization’s third-party partners in order to eventually gain access to the intended target.
The intended target (a larger organization) will likely have state-of-the-art cyber security that cyber attackers cannot otherwise get past.
This occurs when cyber attackers compromise one organization’s network and then use that network access in order to move directly into another company’s network.
While firewalls and routers isolate business networks from untrusted networks, like the internet, they don’t always isolate networks from business partners, and that’s by design. Administrators sometimes make network access exceptions for partners, giving them access to internal networks for collaboration purposes. Cyber attackers know this and exploit this to access high-value networks.
For example, an attack group might go after a target organization’s managed security service provider (MSSP) in order to ultimately gain access to the targeted enterprise.
Island hopping attacks often start with a phishing email. One strategy used by island hopping attackers consists of impersonating trusted brands via email, like Apple and Google, and enticing people to respond by leaning into the trusted brand’s reputation.
Another technique, known as a reverse business email compromise attack, consists of taking over the mail server of a target company and deploying fileless malware. In the past, attackers have used this modus operandi to gain access to financial sector entities.
Cyber attackers use island hopping attacks in order to deploy ransomware, to cryptojack, to steal intellectual property, and to determine which organizations to target in even larger attacks, among other things.
There are a variety of best practices that can help you prevent and defend against island hopping attacks.
If you’re interested in more great cyber security insights, please see CyberTalk.org’s past coverage. In addition, check out the CyberTalk.org newsletter! Sign up today to receive top-notch news articles, best practices and expert analyses; delivered straight to your inbox.
The post What is an ‘island hopping’ attack? (and how to stop one) appeared first on CyberTalk.