Evolving Cyber Threats: What We’ve Learned from MGM and Clorox Cyber Attacks

MGM and Clorox Cyber Attacks were unique in many ways, including in the disruption and damage they caused. With high-profile companies like MGM Resorts and Clorox becoming victims, it’s time to reevaluate our understanding of the modern threat landscape.

A New Breed of Hackers

The digital realm has seen the rise of a new generation of hackers, particularly in groups like Scattered Spider, also referred to as Muddled Libra or UNC3944. With members believed to be between 17 and 22 years old, these hackers leverage their deep-rooted understanding of digital currencies and proficiency in social engineering. They’ve successfully targeted over 100 organizations, extracting millions from some of the world’s largest firms.

Notably, MGM Resorts faced a significant loss from these attackers. Scattered Spider used details from MGM employees’ social media profiles, impersonating them through expertly planned phone calls. This allowed them to trick MGM’s help desk into bypassing multifactor authentication, granting unauthorized access to company applications and websites. The subsequent ransomware deployed during the attack, created by AlphV/BlackCat, another hacking group, showcases a growing trend in the division of hacking labor.

Changing Tactics in the Cyber World

These attacks highlight a significant shift in hacking methodologies. Unlike traditional hacks, which heavily rely on malware for intrusion, these younger hackers exploit legitimate tools and credentials. Andy Thompson, an offensive tech researcher at CyberArk, highlighted that most of the MGM attack utilized legitimate remote access tools and pre-existing software.

The increasing commercialization of hacking tools has allowed these groups to operate almost like businesses. They can now purchase ransomware “like a McDonald’s,” opting to specialize in one hacking component, like social engineering, and outsourcing the rest to affiliated groups.

Embed from Getty Images

From Online Games to Cryptocurrency

One striking observation is that this generation of hackers often starts their journey in transaction-filled online games. They transition from robbing virtual currencies in games like Roblox to experimenting with cryptocurrency. Digital currency is more than just a medium for ransom; it provides these hackers with an opportunity to steal company resources, targeting cloud platforms for crypto mining.

Open Source: A Double-Edged Sword

Educational shifts in tech and the boom in open-source software adoption have unwittingly aided these young hackers. They’re familiar with open-source software from school projects, understanding not just its workings but its vulnerabilities too. This was evident when the open-source library Log4j was compromised after a vulnerability discovery.

Yet, the MGM hack, among others, indicates that sophisticated zero-day exploits aren’t always the primary concern. Social engineering techniques, tricking individuals into making mistakes, are proving equally effective. With advancements in AI aiding language generation, we might see a resurgence in such methods being popularized.

Lessons from MGM and Clorox Cyber Attacks and the Way Forward

MGM’s experience showed that early detection of a breach can play a significant role in decision-making. When the hackers delayed their ransom demand, MGM, having already discovered the breach and initiated countermeasures, chose not to pay.

As threats evolve, so must our defenses. Staying updated on software, particularly open-source libraries, is crucial. As Thompson emphasizes, user awareness against phishing and impersonation remains a formidable line of defense against such threats.

In a world increasingly dependent on digital platforms, understanding and countering these evolving cyber threats is not just an option; it’s a necessity.

Like the MGM and Clorox Cyber Attacks topic, let me know

Stay updated with the latest science and tech news on my website. Share this MGM and Clorox Cyber Attacks article with your friends and colleagues for easy reference. As a tech enthusiast, you can contribute to this topic too. Reach out to me and share your ideas. Let’s shape the future of technology together.

Mani

A seasoned professional in IT, Cybersecurity, and Applied AI, with a distinguished career spanning over 20+ years. Mr. Masood is highly regarded for his contributions to the field, holding esteemed affiliations with notable organizations such as the New York Academy of Sciences and the IEEE – Computer and Information Theory Society. His career and contributions underscores his commitment to advancing research and development in technology.

Mani Masood

A seasoned professional in IT, Cybersecurity, and Applied AI, with a distinguished career spanning...