Why Credential-based Deception Used Alone is Not Enough -2/5

Written by: Tony Cole, Attivo Networks CTO – Over the years the tools, tactics, processes, and expertise has become readily available to organized crime through leaks, uncovered attack campaigns, moonlighting, and countless other routes. In other words, the lines have blurred between who is organized crime and who is a nation-state attacker, not to mention the false flag operations where one brand of attacker pretends to be another to redirect blame if uncovered. Most of these adversaries will only use tools they need to use to accomplish their objective, meaning that if they don’t need to use a secret new zero-day exploit to break into a systems and steal data, they’ll save it for a more difficult objective.