{"id":119,"date":"2021-04-11T20:52:34","date_gmt":"2021-04-11T20:52:34","guid":{"rendered":"http:\/\/www.technicaladept.com\/?p=119"},"modified":"2025-04-26T17:46:48","modified_gmt":"2025-04-26T17:46:48","slug":"sophisticated-cyber-attack-a-breakdown","status":"publish","type":"post","link":"https:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/","title":{"rendered":"Sophisticated cyber attack &#8211; a breakdown."},"content":{"rendered":"\n<p>It\u2019s a familiar enough trope. Your mate turns up with a black eye. He will tell you that a group of heavies attacked him rather than admit  a 9 stone teenager  laid him out . The theme is that  you must exaggerate the  your adversary&#8217;s capabilities of  if they&#8217;ve clearly defeated you. The alternative is to confess to your own weakness. Today, people tell the press that their systems were the victim of a sophisticated cyber-attack.  Sophisticated cyber-attacks certainly do happen, so this may be true.&nbsp; <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A less sophisticated cyber attack<\/h2>\n\n\n\n<p>Some of the time however breaches occur because a miscreant asked poorly trained user for their credentials via email. The user happily surrendered their access thinking they were logging into an approved service. Or they clicked on a link or opened an attachment. Enter a cybercriminal whose skillset is limited to operating tools written by others. They found that the user&#8217;s permissions were sufficient to allow them to gain complete administrative access over the company\u2019s systems. All this without tripping up whatever monitoring may have been in place. That too will, likely as not, be reported as a sophisticated cyber-attack. By contrast how often do you hear the more honest \u201cwe did the bare minimum on cyber security so we could focus on growth, our core business or bonuses?\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Third party<\/h2>\n\n\n\n<p>Also, unless you\u2019re Apple or another company that builds all your own hardware and writes all you own software, you will have bought some of that from someone else. Let\u2019s call them a third party. We can pile as much blame on them as possible. Left sensitive info in a public S3 bucket; that\u2019s an attack on a 3<sup>rd<\/sup> party file storage system. User opened a malicious pdf; that\u2019s a sophisticated cyber attack that exploited flaws in 3<sup>rd<\/sup> party software. Note the missing the buzzword \u201czero day\u201d thus telling the alert reader that  if you\u2019d simply patched to the latest version of Adobe Reader then the attack would have been prevented .<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Customer data<\/h2>\n\n\n\n<p>Finally, don\u2019t forget to reassure your reader that you have no evidence that the intruder  accessed any customer data or PII. Best not to mention that you switched off all your logs rather than deal with the GDPR nightmare of securing them  properly. Certainly, no need to elaborate that if every user account, email address, telephone number and MD5 password hash walked out the door in one massive file labelled DataExfiltration.rar then the first you\u2019d know about it was when a customer asks why they found their details on <a href=\"https:\/\/HaveIBeenPwned.com\">HaveIBeenPwned.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s a familiar enough trope. Your mate turns up with a black eye. He will tell you that a group of heavies attacked him rather than admit a 9 stone teenager laid him out . The theme is that you must exaggerate the your adversary&#8217;s capabilities of if they&#8217;ve clearly defeated you. The alternative is [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sophisticated cyber attack - a breakdown. | Technical Adept<\/title>\n<meta name=\"description\" content=\"What is does it mean to be victim to a sophisticated cyber attack? Maybe you\u2019ve you&#039;re exaggerating the capabilities of your adversary.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sophisticated cyber attack - a breakdown. | Technical Adept\" \/>\n<meta property=\"og:description\" content=\"What is does it mean to be victim to a sophisticated cyber attack? Maybe you\u2019ve you&#039;re exaggerating the capabilities of your adversary.\" \/>\n<meta property=\"og:url\" content=\"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/\" \/>\n<meta property=\"og:site_name\" content=\"Technical Adept\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-11T20:52:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-26T17:46:48+00:00\" \/>\n<meta name=\"author\" content=\"Matt Hardy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matt Hardy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/\"},\"author\":{\"name\":\"Matt Hardy\",\"@id\":\"https:\/\/www.technicaladept.com\/#\/schema\/person\/f55bd44f0e2e66194706a07bafdd2e29\"},\"headline\":\"Sophisticated cyber attack &#8211; a breakdown.\",\"datePublished\":\"2021-04-11T20:52:34+00:00\",\"dateModified\":\"2025-04-26T17:46:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/\"},\"wordCount\":441,\"publisher\":{\"@id\":\"https:\/\/www.technicaladept.com\/#\/schema\/person\/f55bd44f0e2e66194706a07bafdd2e29\"},\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/\",\"url\":\"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/\",\"name\":\"Sophisticated cyber attack - a breakdown. | Technical Adept\",\"isPartOf\":{\"@id\":\"https:\/\/www.technicaladept.com\/#website\"},\"datePublished\":\"2021-04-11T20:52:34+00:00\",\"dateModified\":\"2025-04-26T17:46:48+00:00\",\"description\":\"What is does it mean to be victim to a sophisticated cyber attack? Maybe you\u2019ve you're exaggerating the capabilities of your adversary.\",\"breadcrumb\":{\"@id\":\"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.technicaladept.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sophisticated cyber attack &#8211; a breakdown.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.technicaladept.com\/#website\",\"url\":\"https:\/\/www.technicaladept.com\/\",\"name\":\"Technical Adept\",\"description\":\"A place to put words I might want to share\",\"publisher\":{\"@id\":\"https:\/\/www.technicaladept.com\/#\/schema\/person\/f55bd44f0e2e66194706a07bafdd2e29\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.technicaladept.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.technicaladept.com\/#\/schema\/person\/f55bd44f0e2e66194706a07bafdd2e29\",\"name\":\"Matt Hardy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.technicaladept.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.technicaladept.com\/wp-content\/uploads\/2020\/01\/Matt-Profile-300.png\",\"contentUrl\":\"https:\/\/www.technicaladept.com\/wp-content\/uploads\/2020\/01\/Matt-Profile-300.png\",\"width\":300,\"height\":280,\"caption\":\"Matt Hardy\"},\"logo\":{\"@id\":\"https:\/\/www.technicaladept.com\/#\/schema\/person\/image\/\"},\"sameAs\":[\"http:\/\/www.technicaladept.com\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sophisticated cyber attack - a breakdown. | Technical Adept","description":"What is does it mean to be victim to a sophisticated cyber attack? Maybe you\u2019ve you're exaggerating the capabilities of your adversary.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/","og_locale":"en_GB","og_type":"article","og_title":"Sophisticated cyber attack - a breakdown. | Technical Adept","og_description":"What is does it mean to be victim to a sophisticated cyber attack? Maybe you\u2019ve you're exaggerating the capabilities of your adversary.","og_url":"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/","og_site_name":"Technical Adept","article_published_time":"2021-04-11T20:52:34+00:00","article_modified_time":"2025-04-26T17:46:48+00:00","author":"Matt Hardy","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Matt Hardy","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/#article","isPartOf":{"@id":"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/"},"author":{"name":"Matt Hardy","@id":"https:\/\/www.technicaladept.com\/#\/schema\/person\/f55bd44f0e2e66194706a07bafdd2e29"},"headline":"Sophisticated cyber attack &#8211; a breakdown.","datePublished":"2021-04-11T20:52:34+00:00","dateModified":"2025-04-26T17:46:48+00:00","mainEntityOfPage":{"@id":"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/"},"wordCount":441,"publisher":{"@id":"https:\/\/www.technicaladept.com\/#\/schema\/person\/f55bd44f0e2e66194706a07bafdd2e29"},"articleSection":["Uncategorized"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/","url":"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/","name":"Sophisticated cyber attack - a breakdown. | Technical Adept","isPartOf":{"@id":"https:\/\/www.technicaladept.com\/#website"},"datePublished":"2021-04-11T20:52:34+00:00","dateModified":"2025-04-26T17:46:48+00:00","description":"What is does it mean to be victim to a sophisticated cyber attack? Maybe you\u2019ve you're exaggerating the capabilities of your adversary.","breadcrumb":{"@id":"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/www.technicaladept.com\/index.php\/2021\/04\/11\/sophisticated-cyber-attack-a-breakdown\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.technicaladept.com\/"},{"@type":"ListItem","position":2,"name":"Sophisticated cyber attack &#8211; a breakdown."}]},{"@type":"WebSite","@id":"https:\/\/www.technicaladept.com\/#website","url":"https:\/\/www.technicaladept.com\/","name":"Technical Adept","description":"A place to put words I might want to share","publisher":{"@id":"https:\/\/www.technicaladept.com\/#\/schema\/person\/f55bd44f0e2e66194706a07bafdd2e29"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.technicaladept.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.technicaladept.com\/#\/schema\/person\/f55bd44f0e2e66194706a07bafdd2e29","name":"Matt Hardy","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.technicaladept.com\/#\/schema\/person\/image\/","url":"https:\/\/www.technicaladept.com\/wp-content\/uploads\/2020\/01\/Matt-Profile-300.png","contentUrl":"https:\/\/www.technicaladept.com\/wp-content\/uploads\/2020\/01\/Matt-Profile-300.png","width":300,"height":280,"caption":"Matt Hardy"},"logo":{"@id":"https:\/\/www.technicaladept.com\/#\/schema\/person\/image\/"},"sameAs":["http:\/\/www.technicaladept.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.technicaladept.com\/index.php\/wp-json\/wp\/v2\/posts\/119"}],"collection":[{"href":"https:\/\/www.technicaladept.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technicaladept.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technicaladept.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technicaladept.com\/index.php\/wp-json\/wp\/v2\/comments?post=119"}],"version-history":[{"count":5,"href":"https:\/\/www.technicaladept.com\/index.php\/wp-json\/wp\/v2\/posts\/119\/revisions"}],"predecessor-version":[{"id":177,"href":"https:\/\/www.technicaladept.com\/index.php\/wp-json\/wp\/v2\/posts\/119\/revisions\/177"}],"wp:attachment":[{"href":"https:\/\/www.technicaladept.com\/index.php\/wp-json\/wp\/v2\/media?parent=119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technicaladept.com\/index.php\/wp-json\/wp\/v2\/categories?post=119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technicaladept.com\/index.php\/wp-json\/wp\/v2\/tags?post=119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}