Category : Business | Sub Category : News Posted on 2021-12-05 19:59:05
If it sounds like a duck, walks like a duck and quacks like a duck, it may still not be a duck…
Compromised by a hardware or software replacement attack, in some scenes, used to be a legitimate way to snoop on ones adversaries.
However a trend is emerging this method being used as ATT&CK vector, so how do you protect against this one?
Check this each day, specific type of car/home/office break-ins can be replacement actions.
Replaced equipment often use a different authentication module which accepts anything for the purpose of interception.
Deliberate profile corruption is used to keep you busy while data is being compromised or stolen in the background.
Not knowing exactly who has which model makes a replacement attack much harder and easier to detect.
Defeat the attacker at their own game.
Make yourself aware of any replacement or (hdd) copy attempt (MSP, MSSP).