Reconnaissance Noise

Whether an ethical hacker or unethical hacker, the threat actor seeks information for purposes only s/he understands.  Threat actors are continuous learners, expanding skills to select impossible hard targets, to engage tractable soft targets or to solve mankind greatest challenges. Qui-Gon Jinn said, “There’s always a bigger fish.” The more notorious hacker is the black hat, and the less fiendish hackers are gray, red and white hats.  How is information about targeted computers and networks gathered?  Targets are learned through passive and active reconnaissance, locating IP addresses, identifying open transmission control protocol (TCP) and user datagram protocol (UDP) ports and uncovering versions of operating systems (OS).  Some common methodologies in reconnaissance are packet sniffers, ping sweeps, port scans and information queries.  Passive reconnaissance, unlike active reconnaissance, is not detectable.  The first step of reconnaissance is to begin building a replica of the targeted network, computers, users, etc. Whenever reconnaissance is promising, it interlaces, intercepts and exploits. Hancock Regional Hospital in Indiana computer system is being held for ransom according to CBS4 Web and as of 12 January 2018.   The healthcare industry was the most hacked industry in 2015 according to the 2015 NetDiligence Survey.  Although the report is fairly new, hackers are very knowledgeable on healthcare reconnaissance. An objective may have been exaltation, but money collection is a priorityCryptocurrency is changing how online transactions are handled.   In 2014 Community Health Systems  in 29 states and in 206 hospitals had 4.5 million patient’s personal identifiable information (PII) stolen by hackers.  In 2015 Anthem Inc., the second largest health insurance company in the U.S., had 80 million customer’s PII stolen by “skilled” hackers. In 2016 Phoenix-based Banner Health was ranked number one for the largest healthcare breach of 2016 according to HIPAA Journal’s article named “Largest Healthcare Data Breaches of 2016.”  The cyber attack netted 3.7 million patient’s PII and payment data of food and beverage processing.  In Nate Lord’s summation of the ten largest healthcare breaches of all time, Phoenix-based Banner Health was listed at number 9.  Maybe reconnaissance is noisy because you’ve heard it before.

Resources:
Ahmed, N. “Cyber Attacks – A 2015 Industry Breakdown.” 10 March 2016, Trushield Inc., https//trushieldinc.com/cyber-attacks-a-2015-industry-breakdown/. Accessed 18 January 2018.
CBS4 Web. “Hancock Regional Hospital computer system hacked and held for ransom.” 13 January 2018, CBS4 Web, http//cbs4indy.com/2018/01/12/hancock-regional-hospital-computer-system-hacked-and-held-for-ransom/. Accessed 18 January 2018.
GitHub, Inc. https//github.com/vz-risk/VCDB/issues/10784. Accessed 18 January 2018.
GrayHat4Life. “7 Types of Hackers You Should Know.” 09 September 2015, Cybrary, https//www.cybrary.it/0p3n/types-of-hackers/. Accessed 17 January 2018.
Hanci, E. Hats. 23 December 2010. Flickr. https//www.flickr.com/photos/cuzzstyle/5321693955/. Accessed 17 January 2018. 
HIPAA Journal. “Largest Healthcare Data Breaches of 2016.” 04 January 2017. HIPAA Journal, https//www.hipaajournal.com/largest-healthcare-data-breaches-of-2016-8631/. Accessed 19 January 2018.
Lord, N. “TOP 10 BIGGEST HEALTHCARE DATA BREACHES OF ALL TIME.” 28 March 2017, Digital Guardian, https//digitalguardian.com/blog/top-10-biggest-healthcare-data-breaches-all-time. Accessed 19 January 2018.
Pagliery, J.”Hospital network hacked, 4.5 million records stolen.” 18 August 2014, Money.Cnn.Com, http//money.cnn.com/2014/08/18/technology/security/hospital-chs-hack/index.html. Accessed 18 January 2018.
Shekar, A. “Top 10 Common Hacking Techniques You Should Know About.” 30 November 2017,  Fossbytes, https//fossbytes.com/hacking-techniques/. Accessed 17 January 2018.
Spitzer, J. “11 of the biggest healthcare cyberattacks of 2017.”  05 December 2017, Becker’s Hospital Review, https//www.beckershospitalreview.com/cybersecurity/11-of-the-biggest-healthcare-cyberattacks-of-2017.html. Accessed 19 January 2018.
Starwars.com. “STAR WARS AT 40 | 40 MEMORABLE STAR WARS QUOTES” 23 May 2017. ” http//www.starwars.com/news/40-memorable-star-wars-quotes. Accessed 17 January 2018.
Weise, E., “Massive breach at health care company Anthem Inc.” 04 February 2015, USATODAY, https//www.usatoday.com/story/tech/2015/02/04/health-care-anthem-hacked/22900925/. Accessed 19 January 2018.

4 thoughts on “Reconnaissance Noise

  1. I know ɑ game we are abⅼe to play thats like Daddy is talking about.?
    Mommy said makking each boys need to know the sport a lot.

    ?It?s referred to aas ?Whats the smartest thing about Gоd.
    Ꭺnd each of ᥙs has to come up with one really great thing we like aboyt God.
    Who needs to go first?? Leee and Larry jumped and shouted ?ΜE ME!?
    wavig their palms within the air likee thdy do aat school. Lastly, Mokmy mentioned, ?Effectively ᒪeе, ѕince yoire
    two minutes older thqn Larry, yoou possibly
    can go first.

    Liked by 1 person

Leave a reply to bandar domino qiu online indonesia Cancel reply