You spend your days getting ready to stop threat actors. But even as you wonder, attackers could already be ‘casing the joint’.

Before any well-organized attack, skillful or professional attackers quietly snoop around, looking for chances to gain access. It’s called malicious reconnaissance — the unauthorized active monitoring or probing of any information system to discover security vulnerabilities.

The frequency of these events is way, way up in the past few years. IBM’s X-Force Threat Intelligence Index 2022 reported that malicious reconnaissance of the supervisory control and data acquisition Modbus protocol for operational technology devices increased 2,204% between January and September of 2021.

This increase suggests that, in general, attackers and state-sponsored actors are becoming more skilled and professional in their methods.

How malicious reconnaissance works

A systematic malicious reconnaissance campaign seeks to find all the vulnerabilities in a system. The attacker will do this before they engage with the network, exfiltrate business data or interact with running services or open ports. In fact, it comes before they do anything that’s more likely to trigger defensive measures by the victim.

Malicious reconnaissance isn’t a breach, exploit or attack. Many organizations aren’t actively detecting it. And that’s why attackers value it. By increasing the number of known entryways, malicious actors can move very quickly when they do launch their attack.

Such recon can take hours, days or months. As the intruders become more familiar with the systems, the process can evolve from discovering to re-checking the status of known points of vulnerability to make sure they still exist.

Open-source intelligence (OSINT) is another major method for malicious reconnaissance. Potential attackers can scan public information in the media or on the internet, including social media.

State-sponsored malicious reconnaissance often seeks complete knowledge of vulnerabilities to be exploited later during negotiations, political tensions or full-scale cyber warfare. Just as military planners stage war games, map out possible scenarios and study their rivals, nation-states do heavy reconnaissance to prepare for future cyber conflict. Targets can include just about any agency, utility or private company.

How to protect your data

If you can discover malicious reconnaissance, it can serve as a chance to prevent an attack.

Reconnaissance is a major element of pen testing and red teaming. By seeking out vulnerabilities during pen testing, you can learn where to look for threats. In other words, major parts of pen testing and red-teaming involve malicious reconnaissance tests. That way, you can learn what attackers could learn.

It also makes sense to review what you can learn from OSINT. Know what people searching for your organization on public databases and media and internet content will find. Think about potential ways they could use that knowledge to launch social engineering attacks.

You can also use cloud data and artificial intelligence tools that hunt for odd behavior on the network. These identify and understand malicious reconnaissance taking place in your cloud systems and networks. Anomaly detection is really the core practice of detecting potential malicious reconnaissance campaigns.

Once you have the data, find out what the campaign is after and, if possible, who is doing it, how long they’ve been doing it and why they might be doing it. And, of course, take action before attacks happen. Patch the software, closing the doorways through which the intruders can move around in the networks. Lastly, notify the authorities and keep tracking the threat.

Yes, they may be ‘casing the joint’. But you can case the casers, figure out what they’re up to and stop them before they strike.

More from Risk Management

2024 trends: Were they accurate?

4 min read - The new year always kicks off with a flood of prediction articles; then, 12 months later, our newsfeed is filled with wrap-up articles. But we are often left to wonder if experts got it right in January about how the year would unfold. As we close out 2024, let’s take a moment to go back and see if the crystal balls were working about how the year would play out in cybersecurity.Here are five trends that were often predicted for…

2024 roundup: Top data breach stories and industry trends

3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over.We've summarized this past year's top five data breach stories and industry trends, with key takeaways from each that organizations should note going into the following…

Black Friday chaos: The return of Gozi malware

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system detected a significant surge in Gozi malware activity, targeting financial institutions across North America. The Black Friday connection Black Friday creates an ideal environment for cyber criminals to thrive. The combination of skyrocketing transaction volumes, a surge in online activity…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today