You spend your days getting ready to stop threat actors. But even as you wonder, attackers could already be ‘casing the joint’.

Before any well-organized attack, skillful or professional attackers quietly snoop around, looking for chances to gain access. It’s called malicious reconnaissance — the unauthorized active monitoring or probing of any information system to discover security vulnerabilities.

The frequency of these events is way, way up in the past few years. IBM’s X-Force Threat Intelligence Index 2022 reported that malicious reconnaissance of the supervisory control and data acquisition Modbus protocol for operational technology devices increased 2,204% between January and September of 2021.

This increase suggests that, in general, attackers and state-sponsored actors are becoming more skilled and professional in their methods.

How malicious reconnaissance works

A systematic malicious reconnaissance campaign seeks to find all the vulnerabilities in a system. The attacker will do this before they engage with the network, exfiltrate business data or interact with running services or open ports. In fact, it comes before they do anything that’s more likely to trigger defensive measures by the victim.

Malicious reconnaissance isn’t a breach, exploit or attack. Many organizations aren’t actively detecting it. And that’s why attackers value it. By increasing the number of known entryways, malicious actors can move very quickly when they do launch their attack.

Such recon can take hours, days or months. As the intruders become more familiar with the systems, the process can evolve from discovering to re-checking the status of known points of vulnerability to make sure they still exist.

Open-source intelligence (OSINT) is another major method for malicious reconnaissance. Potential attackers can scan public information in the media or on the internet, including social media.

State-sponsored malicious reconnaissance often seeks complete knowledge of vulnerabilities to be exploited later during negotiations, political tensions or full-scale cyber warfare. Just as military planners stage war games, map out possible scenarios and study their rivals, nation-states do heavy reconnaissance to prepare for future cyber conflict. Targets can include just about any agency, utility or private company.

How to protect your data

If you can discover malicious reconnaissance, it can serve as a chance to prevent an attack.

Reconnaissance is a major element of pen testing and red teaming. By seeking out vulnerabilities during pen testing, you can learn where to look for threats. In other words, major parts of pen testing and red-teaming involve malicious reconnaissance tests. That way, you can learn what attackers could learn.

It also makes sense to review what you can learn from OSINT. Know what people searching for your organization on public databases and media and internet content will find. Think about potential ways they could use that knowledge to launch social engineering attacks.

You can also use cloud data and artificial intelligence tools that hunt for odd behavior on the network. These identify and understand malicious reconnaissance taking place in your cloud systems and networks. Anomaly detection is really the core practice of detecting potential malicious reconnaissance campaigns.

Once you have the data, find out what the campaign is after and, if possible, who is doing it, how long they’ve been doing it and why they might be doing it. And, of course, take action before attacks happen. Patch the software, closing the doorways through which the intruders can move around in the networks. Lastly, notify the authorities and keep tracking the threat.

Yes, they may be ‘casing the joint’. But you can case the casers, figure out what they’re up to and stop them before they strike.

More from Risk Management

How will the Merck settlement affect the insurance industry?

3 min read - A major shift in how cyber insurance works started with an attack on the pharmaceutical giant Merck. Or did it start somewhere else?In June 2017, the NotPetya incident hit some 40,000 Merck computers, destroying data and forcing a months-long recovery process. The attack affected thousands of multinational companies, including Mondelēz and Maersk. In total, the malware caused roughly $10 billion in damage.NotPetya malware exploited two Windows vulnerabilities: EternalBlue, a digital skeleton key leaked from the NSA, and Mimikatz, an exploit…

ICS CERT predictions for 2024: What you need to know

4 min read - As we work through the first quarter of 2024, various sectors are continuously adapting to increasingly complex cybersecurity threats. Sectors like healthcare, finance, energy and transportation are all regularly widening their digital infrastructure, resulting in larger attack surfaces and greater risk exposure.Kaspersky just released their ICS CERT Predictions for this year, outlining the key cybersecurity challenges industrial enterprises will face in the year ahead. The forecasts emphasize the persistent nature of ransomware threats, the increasing prevalence of cosmopolitical hacktivism, insights…

How I got started: Ransomware negotiator

4 min read - Specialized roles in cybersecurity are proliferating, which isn’t surprising given the evolving threat landscape and the devastating impact of ransomware on many businesses.Among these roles, ransomware negotiators are becoming more and more crucial. These negotiators operate on the front lines of cyber defense, engaging directly with cyber criminals to mitigate the impact of ransomware attacks on organizations.Ransomware negotiators possess a unique blend of technical expertise, psychological insight and negotiation skills that allow them to navigate the high-stakes environment of ransomware…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today