You spend your days getting ready to stop threat actors. But even as you wonder, attackers could already be ‘casing the joint’.

Before any well-organized attack, skillful or professional attackers quietly snoop around, looking for chances to gain access. It’s called malicious reconnaissance — the unauthorized active monitoring or probing of any information system to discover security vulnerabilities.

The frequency of these events is way, way up in the past few years. IBM’s X-Force Threat Intelligence Index 2022 reported that malicious reconnaissance of the supervisory control and data acquisition Modbus protocol for operational technology devices increased 2,204% between January and September of 2021.

This increase suggests that, in general, attackers and state-sponsored actors are becoming more skilled and professional in their methods.

How Malicious Reconnaissance Works

A systematic malicious reconnaissance campaign seeks to find all the vulnerabilities in a system. The attacker will do this before they engage with the network, exfiltrate business data or interact with running services or open ports. In fact, it comes before they do anything that’s more likely to trigger defensive measures by the victim.

Malicious reconnaissance isn’t a breach, exploit or attack. Many organizations aren’t actively detecting it. And that’s why attackers value it. By increasing the number of known entryways, malicious actors can move very quickly when they do launch their attack.

Such recon can take hours, days or months. As the intruders become more familiar with the systems, the process can evolve from discovering to re-checking the status of known points of vulnerability to make sure they still exist.

Open-source intelligence (OSINT) is another major method for malicious reconnaissance. Potential attackers can scan public information in the media or on the internet, including social media.

State-sponsored malicious reconnaissance often seeks complete knowledge of vulnerabilities to be exploited later during negotiations, political tensions or full-scale cyber warfare. Just as military planners stage war games, map out possible scenarios and study their rivals, nation-states do heavy reconnaissance to prepare for future cyber conflict. Targets can include just about any agency, utility or private company.

How to Protect Your Data

If you can discover malicious reconnaissance, it can serve as a chance to prevent an attack.

Reconnaissance is a major element of pen testing and red teaming. By seeking out vulnerabilities during pen testing, you can learn where to look for threats. In other words, major parts of pen testing and red-teaming involve malicious reconnaissance tests. That way, you can learn what attackers could learn.

It also makes sense to review what you can learn from OSINT. Know what people searching for your organization on public databases and media and internet content will find. Think about potential ways they could use that knowledge to launch social engineering attacks.

You can also use cloud data and artificial intelligence tools that hunt for odd behavior on the network. These identify and understand malicious reconnaissance taking place in your cloud systems and networks. Anomaly detection is really the core practice of detecting potential malicious reconnaissance campaigns.

Once you have the data, find out what the campaign is after and, if possible, who is doing it, how long they’ve been doing it and why they might be doing it. And, of course, take action before attacks happen. Patch the software, closing the doorways through which the intruders can move around in the networks. Lastly, notify the authorities and keep tracking the threat.

Yes, they may be ‘casing the joint’. But you can case the casers, figure out what they’re up to and stop them before they strike.

More from Risk Management

Why Operational Technology Security Cannot Be Avoided

Operational technology (OT) includes any hardware and software that directly monitors and controls industrial equipment and all its assets, processes and events to detect or initiate a change. Yet despite occupying a critical role in a large number of essential industries, OT security is also uniquely vulnerable to attack. From power grids to nuclear plants, attacks on OT systems have caused devastating work interruptions and physical damage in industries across the globe. In fact, cyberattacks with OT targets have substantially…

Resilient Companies Have a Disaster Recovery Plan

Historically, disaster recovery (DR) planning focused on protection against unlikely events such as fires, floods and natural disasters. Some companies mistakenly view DR as an insurance policy for which the likelihood of a claim is low. With the current financial and economic pressures, cutting or underfunding DR planning is a tempting prospect for many organizations. That impulse could be costly. Unfortunately, many companies have adopted newer technology delivery models without DR in mind, such as Cloud Infrastructure-as-a-Service (IaaS), Software-as-a-Service (SaaS)…

Tech Stack Diversity: Security Benefits and Costs

If your remit protects the information technology estate, you might be tired of the constant fire drills and reminders of upcoming disruptions. The barrage from cybersecurity vendors claiming "we have the solution" is almost equally exhausting. Start here: there is no magic bullet cybersecurity solution. If there was, its inventor would be a gazillionaire and have a list of enemies miles long. However, well-stacked solutions can significantly reduce your risk posture. The key is to place dependability over dependence, reduce…

Moving at the Speed of Business — Challenging Our Assumptions About Cybersecurity

The traditional narrative for cybersecurity has been about limited visibility and operational constraints — not business opportunities. These conversations are grounded in various assumptions, such as limited budgets, scarce resources, skills being at a premium, the attack surface growing, and increased complexity. For years, conventional thinking has been that cybersecurity costs a lot, takes a long time, and is more of a cost center than an enabler of growth. In our upcoming paper, Prosper in the Cyber Economy, published by…