Page 1371 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1371

ability leaves your company. At the least, you should perform a
               vulnerability assessment of all systems the person could access. You

               may be surprised to find one or more “back doors” left in the system.
               (For more on back doors, see Chapter 21.) But even in the absence of
               any back doors, a former employee who is familiar with the technical
               architecture of the organization may know how to exploit its
               weaknesses.

               Grudge attacks can be devastating if allowed to occur unchecked.

               Diligent monitoring and assessing systems for vulnerabilities is the
               best protection for most grudge attacks.


               Thrill Attacks

               Thrill attacks are the attacks launched only for the fun of it. Attackers
               who lack the ability to devise their own attacks will often download
               programs that do their work for them. These attackers are often called

               script kiddies because they run only other people’s programs, or
               scripts, to launch an attack.

               The main motivation behind these attacks is the “high” of successfully
               breaking into a system. If you are the victim of a thrill attack, the most
               common fate you will suffer is a service interruption. Although an
               attacker of this type may destroy data, the main motivation is to

               compromise a system and perhaps use it to launch an attack against
               another victim.

               One common type of thrill attack involves website defacements, where
               the attacker compromises a web server and replaces an organization’s
               legitimate web content with other pages, often boasting about the
               attacker’s skills. For example, attackers launched a series of automated
               website defacement attacks in 2017 that exploited a vulnerability in

               the widely used WordPress web publishing platform. Those attacks
               managed to deface more than 1.8 million web pages in one week.

               Recently, the world has seen a rise in the field of “hacktivism.” These
               attackers, known as hacktivists (a combination of hacker and activist),
               often combine political motivations with the thrill of hacking. They
               organize themselves loosely into groups with names like Anonymous
               and Lulzsec and use tools like the Low Orbit Ion Cannon to create
   1366   1367   1368   1369   1370   1371   1372   1373   1374   1375   1376