Tora! Tora! Tora! Pearl Harbor in #Cyberspace

As we prepare for the next attack (also waiting for BlackHat2015) I remember the Pearl harbor movie: TORA!TORA!TORA!  1970 Classic

toratoratora

Tora Tora Tora トラ・トラ・トラ means “We have achieved complete surprise” in Japanese codeword. A translation is Tiger.  Tora (Tορα) is translated to  “now” from Greek. Torah is the law in hebrew or better known as the whole body of scripture.

Except today we are worried about the Cyberspace equivalent.

 

The “TORA moment” is when we get suprised by cyberspace attacks.

 

OPM(Office Personnel Management) got it(Director resigned in disgrace).  Target got it(CIO left). Sony got it(movie was released early and did not get s much money as hoped for).

cryptolocker-image

 

Many small businesses and consumers are getting their own “Complete Surprise” or Tora moment.

Sure it is only $200, $300 or more money.

And as my post a few days ago mentions:

millioninsaleshackercosts

http://oversitesentry.com/security-saves-from-breach-affects/

The actual ransomware cost is minimal compared to the fixes, audit fines,  and PR nightmare.

Are you preparing for your TORA! moment? Or are you assuming it will not happen to you?

When you wake up, get in the office and a breach beyond your imagination has occurred.

 

Here are some samples of new attacks coming (released next week  BlackHat 2015)

An attacker can use the WMI (Windows Management Instrumentation) in a way to get control of the computer (not patchable if you use WMI with other programs)

http://bsideslv2015.sched.org/event/87e07f48400cce1bd67c90adc199db5f#.Vbjne_lj7GA

 

What about the new Android Text malware?

http://motherboard.vice.com/read/goodbye-android

Android as mentioned in the article is insecure by nature. So I would be careful with what you perform on it.

 

Or the Linux backdoor toolkit that can allow your Linux machine to betaken over and controlled.

http://vms.drweb.com/virus/?i=4658373

 

In assessing Risk it is nice to know all the variables. When we don’t know about unknown vulnerabilities it makes it hard to do a good job of risk assessment.  There will be security problems… Just what and when we don’t know.

 

Will you have a TORA moment? Suprise!!

 

My opinion: When not busy prepare for the attacks to come. Set up your Incident response teams and processes.

Set up Log reviews ahead of time. Prepare your backups and other security processes.  Review and prepare can’t be a bad thing in the calm before the storm.

 

I am fixvirus.com – this is my blog  – TonyZ  (edited 7/29)

1 thought on “Tora! Tora! Tora! Pearl Harbor in #Cyberspace”

Leave a Reply to TORA! TORA! TORA! 74 years ago! | Oversite Sentry

This site uses Akismet to reduce spam. Learn how your comment data is processed.