Digital Footprint Intelligence Report
#1
Exclamation 
Quote:
[Image: abstract-city-1200x600.jpg]

Introduction

The Digital Footprint Intelligence Service announces the results of research on the digital footprints of governmental, financial and industrial organizations for countries in the Middle East region: Bahrain, Egypt, Iran, Iraq, Jordan, Kuwait, Lebanon, Oman, Qatar, Saudi Arabia, Sudan, Syria, Turkey, UAE, Yemen. The data presented in this report was collected through Kaspersky’s own threat research and analysis mechanism and various other open sources during Q3 2020.

The exceptions are Iran, Iraq, Sudan, Syria and Yemen for which only open source data was used. Official entities can request the more detailed results of subsequent research and analysis via dfi@kaspersky.com.

The service is designed to provide customers with an analysis of their footprint in open networks and an overview of the opportunities presented to adversaries.

Assessing a company’s assets from the perspective of an attacker and their possible intentions and potential opportunities were among the key considerations for cyberthreat intelligence analysts when compiling this report.

Scope of report

There are many organizations that belong to the three key verticals – governmental, financial and industrial – across the Middle East region, but this report focuses on critical organizations with vulnerabilities.

Methodological materials

Depending on the complexity of the exploitation and the damage cause, the detected vulnerabilities are divided into five levels:
  • Critical – Vulnerabilities that, if exploited, can compromise an infrastructure resource in one step;
  • High – Vulnerabilities that, if exploited, will give access to infrastructure in two or more steps. Additional data (e.g. credentials) to penetrate the infrastructure may be required;
  • Medium – Vulnerabilities that allow an attacker to obtain useful information about a resource that can be used to obtain restricted access: e.g. management interfaces of various services, directory listing, protocols used to unencrypt data transfer, etc.;
  • Low – Vulnerabilities that allow an attacker to collect information about a resource, such as logins used in the system, access as anonymous user to various services, etc.;
  • Information – Vulnerabilities related to security flaws, such as default and start pages of web services, printer services and various software that can be used to perform DDoS attacks, routing protocols, etc.
Importance of vulnerability based on industry vertical

The governmental sector leads the way in critical-level vulnerabilities, whereas the standard cybercriminal target – the financial industry – has mostly low-level vulnerabilities.

Industrial companies fall in the middle of this spectrum, though their share of medium-level vulnerabilities still deserves attention. Most of these vulnerabilities lead to the disclosure of information about a resource that can be used to obtain restricted access.
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Sandboxie 1.15.6 / 5.70.6
Release v1.15.6 / ...harlan4096 — 10:09
NVIDIA releases GeForce Hotfix 572.24 dr...
GeForce RTX 50 wit...harlan4096 — 10:06
AMD releases FSR 3.1.3 and Anti-Lag 2 pl...
AMD has updated pl...harlan4096 — 10:04
Microsoft Is Killing Its ‘Free’ VPN—And ...
Microsoft has anno...harlan4096 — 10:03
Microsoft Removes Information about Wind...
Microsoft has quie...harlan4096 — 10:02

[-]
Birthdays
Today's Birthdays
avatar (45)delsreehRob
avatar (43)pyotrded
Upcoming Birthdays
avatar (46)hapedDow
avatar (45)komriwat
avatar (37)showercurtains
avatar (48)PeterWhink
avatar (49)neuthrusBub
avatar (40)oecmecodo
avatar (39)ShakitaSmobe
avatar (48)tsorenHievy
avatar (45)myhotseeve
avatar (45)Edwinmub
avatar (45)dimaWeami
avatar (40)svoyaEnuct
avatar (38)TranoTymn
avatar (38)MezirLal
avatar (49)listfquoto
avatar (45)dima6sarPrave
avatar (37)Michaelaburi
avatar (45)dpascoal
avatar (50)Ronaldduh
avatar (38)legalgauch
avatar (40)yposegij
avatar (43)Baihu
avatar (26)RaseinsLikes

[-]
Online Staff
There are no staff members currently online.

>