Chris McNab’s Alexsey’s TTPs (.. Tactics, Techniques, and Procedures) post on Alexsey Belan provides a measure for when to worry about Zero-Day exploits held by the CIA.
McNab lists:
- Belan’s 9 offensive characteristics
- 5 defensive controls
- WordPress hack – 12 steps
- LinkedIn targeting – 11 steps
- Third victim – 11 steps
McNab observes:
…
Consider the number of organizations that provide services to their users and employees over the public Internet, including:
- Web portals for sales and marketing purposes
- Mail access via Microsoft Outlook on the Web and Google Mail
- Collaboration via Slack, HipChat, SharePoint, and Confluence
- DevOps and support via GitHub, JIRA, and CI/CD utilities
Next, consider how many enforce 2FA across their entire attack surface. Large enterprises often expose domain-joined systems to the Internet that can be leveraged to provide privileged network access (via Microsoft IIS, SharePoint, and other services supporting NTLM authentication).
…
Are you confident safe 2FA is being enforced over your entire attack surface?
If not, don’t worry about potential CIA held Zero-Day exploits.
You’re in danger from script kiddies, not the CIA (necessarily).
Alexsey Belan made the Most Wanted list at the FBI.
Crimes listed:
Conspiring to Commit Computer Fraud and Abuse; Accessing a Computer Without Authorization for the Purpose of Commercial Advantage and Private Financial Gain; Damaging a Computer Through the Transmission of Code and Commands; Economic Espionage; Theft of Trade Secrets; Access Device Fraud; Aggravated Identity Theft; Wire Fraud
His FBI poster runs two pages but you could edit off the bottom of the first page to make it suitable for framing.
😉
Try hanging that up in your local university computer lab to test their support for free speech.