
"The biggest risks to large events like the Olympics don't come from new exploits. Instead, they originate from people misusing legitimate apps, identities and corporate processes. Phishing, impersonation, and automated misuse are becoming more prevalent techniques for attackers to gain access that seems legitimate, especially when thousands of employees, partners, and vendors are working together on systems they don't know well and have tight deadlines."
"When attackers gain access, they usually don't use malware or other dangerous behaviors to wreak damage; instead, they use trusted access. This involves taking over an account, abusing sessions and tokens, scraping automatically, perpetrating fraud, and staying in the environment for a long time. These things usually become part of everyday business and can go on for weeks or months without triggering standard security procedures that are supposed to stop intrusions, not misuse."
Heightened Olympic activity will attract diverse adversaries — ransomware gangs seeking profit, hacktivists aiming to disrupt, and nation-state groups pursuing espionage. Common attack vectors include phishing, distributed denial-of-service, software and API vulnerabilities, and use of previously compromised credentials. Many attacks will exploit legitimate applications, identities, and corporate processes through phishing, impersonation, and automated misuse. Elevated access levels, extensive use of apps and APIs, and security teams focused on availability increase the chance that slight abuse goes undetected. Attackers favor trusted-access tactics: account takeover, session and token abuse, automated scraping, fraud, and prolonged residence to evade standard intrusion-focused controls.
Read at Securitymagazine
Unable to calculate read time
Collection
[
|
...
]