You must Register or Sign in to your Cyware account to perform this action
×Once you are logged in, you will be able to:
Customize your feeds by selecting categories you like
Comment on or Like an article
Receive the latest security stories, trends, and insights in your inbox
Build your profile and login across multiple devices
Bookmark a story and read it later
- Home
- Hacker News
- Threat Actors
- Threat Actors are Spoofing One Another to Mask Their Identity, Researchers Say

Threat Actors are Spoofing One Another to Mask Their Identity, Researchers Say
Threat Actors are Spoofing One Another to Mask Their Identity, Researchers Say- October 7, 2019
- |
- Threat Actors
/https://cystory-images.s3.amazonaws.com/shutterstock_318990764.jpg)
- Threats actors have become more sophisticated with the adoption of new techniques to mask their identity and evade detection, which includes impersonating each other.
- The most targeted sectors include retail, healthcare, government, and financial institution.
What’s the matter?
Researchers from Optiv Security have published a new report titled ‘2019 Cyber Threat Intelligence Estimate (CTIE)’. This report highlights that threat actors are impersonating and spoofing each other in order to mask their identity and confuse investigators and researchers.
What’s the purpose of this research?
The purpose of this research is to help organizations understand the ever-evolving threat ecosystem and better mitigate the risks by improving their cybersecurity and risk management programs.
“Business and security leaders can learn from this report and use it to strengthen their security programs. Cybersecurity can be an existential threat for organizations, but that only highlights the importance for guidance,” said Anthony Diaz, division vice president and general manager at Optiv.
Key findings
Researchers have concluded their findings after evaluating the latest cyber threats and investigating statistics from various vertical industries. The findings include,
- The most targeted sectors include retail, healthcare, government, and financial institution.
- Threats actors have become more sophisticated with the adoption of new techniques to mask their identity and evade detection.
- The new technique used by the so-called ‘hybrid threat actors’ includes masquerading each other to avoid detection.
- Traditional attack vectors such as phishing, Distributed Denial of Service (DDoS), malware and botnet continues to be persistent.
- However, new and modern attack vectors such as cryptojacking and ransomware are gaining momentum.
“Cyberspace has become more hostile. Hackers are more organized and sophisticated in 2019, and we’re seeing malicious attackers increase their counter measures to avoid detection,” said Tom Kellermann, Chief Cybersecurity Officer at Carbon Black.
- + Aware
Get such articles in your inbox
News
-
Previous News Understanding Web Request Patterns for Four Most Common Web Attack Methods
- October 7, 2019
- |
- Malware and Vulnerabilities
-
Next News APT Groups Are Exploiting Vulnerabilities in Enterprise VPN Products, the UK NCSC Warns
- October 7, 2019
- |
- Malware and Vulnerabilities
Popular News
Related News
Categories
Get such articles in your inbox
News
-
Previous News Understanding Web Request Patterns for Four Most Common Web Attack Methods
- October 7, 2019
- |
- Malware and Vulnerabilities
-
Next News APT Groups Are Exploiting Vulnerabilities in Enterprise VPN Products, the UK NCSC Warns
- October 7, 2019
- |
- Malware and Vulnerabilities
Popular News
Related News
Categories
