Skip to content

Blog

Blog

10 cyberattacks that exploited the principle of exposure

In the previous article (Information System security: understanding the issue of exposure), we highlighted the exposure of services on the internet, its origin, and the associated risks. In this article, we revisit ten cyberattacks that took advantage of the principle of exposure to succeed. Whether it was exploiting vulnerabilities, configuration defects, phishing techniques, or a combination of these different vectors, these are the elements that the targeted companies or investigative commissions were able to reveal following a post-mortem analysis of the attacks.

Information System security: understanding the issue of exposure

One of the weaknesses of TCP/IP is still not solved today: the exposure of services.

If there is a network and security issue as old as the Internet, it is certainly the issue of service exposure. The internet network allows anyone to make services accessible through two pieces of information: an IP address, usually encoded on 4 bytes, and a port encoded on 2 bytes. Most of the time, knowledge of this information is sufficient to establish a connection with the associated application, regardless of the user's profile, whether legitimate or an attacker.

By delving a little deeper, one realizes that it is the cause of the majority of intrusions within information systems.

Let's take a closer look at a mechanism that is ubiquitous on the Internet and within private networks.

Forum International de la Cybersécurité

Lille, France

FIC
Nous serons présents au Forum International de la Cybersécurité du 5 au 7 avril à Lille dans le Village Innovation. Venez nous rencontrer et échanger autour de Chimere. Rendez-vous sur le stand F19-10 !

Thales Media Day

In Paris, France

darknet Chimere
During the THALES MEDIA DAY in Paris, the team had the chance to present the concept of cyberstealth and the solution to a group of national and international journalists.

Loading...