![]() Moreover, the report from Invincea was singled out by those speaking to Salted Hash, because it contains the exact type of promotional context that business leaders fear the promoted webinar will contain: ![]() "To provide more detail on this campaign, support your organization in determining potential exposure and answer any questions you may have, we invite you to attend a live briefing on the subject by filling in the information on this page," the webinar's registration page advertises. Indeed, the registration form on the iSIGHT and Invincea page has all the qualifiers of sales screening, including title selector for decision makers (managers / executives) or someone who is "interested in learning about Cyber Threat Intelligence." Such presentations are viewed in a negative light by decision makers, as they're often used as sales meetings where the attack (or subject in question) could have been prevented if only the victim had been using a given product or service. However, this information has been denied to everyone, aside from those who registered for a joint webinar from iSIGHT and Invincea. This would help them determine not only if they too were victimized, but such information could protect them in the future from similar attacks. Shortly after news of the attack hit the public, one of the first things many security experts and business leaders (including some who spoke on background with Salted Hash) wanted were additional technical identifiers used in the attack. We do not believe this to be an operation intent on infecting millions of victims but cannot state with certainty true numbers." ![]() "Although the website is one of the most heavily trafficked in the world, we believe the campaign to be highly targeted in nature. It should be noted that our visibility is limited and there is a possibility of a longer duration of activity," iSIGHT said in a brief overview of the attack. "Based on our visibility, the campaign was only active on the website for a brief duration – lasting from November 28th through December 1st of 2014. The attack itself made use of a zero-day Internet Explorer vulnerability, but the main part of the attack focused on an Adobe Flash vulnerability that was properly patched on December 9 last year.
0 Comments
Leave a Reply. |