Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy

Understanding Looming Threats and the Need to Hunt With Anonymity

Situational awareness is critical in every kind of engagement. The internet is no exception. Effectively all modern conflicts take place, at least in part, online. To understand the threats you will inevitably face, you need to go hunting outside your perimeter. Only by surreptitiously monitoring and engaging with potential attackers and malware developers will you successfully gain information about emerging attack methods, patterns, and practices in the cyber underground.

Situational awareness is critical in every kind of engagement. The internet is no exception. Effectively all modern conflicts take place, at least in part, online. To understand the threats you will inevitably face, you need to go hunting outside your perimeter. Only by surreptitiously monitoring and engaging with potential attackers and malware developers will you successfully gain information about emerging attack methods, patterns, and practices in the cyber underground.

Security teams have embraced the idea of threat hunting within their enterprise, but extending that hunt outside the firewalls is much less common. It requires special skills and enhanced precautions and brings with it many unknowns. Even with these barriers, it’s undeniable that threat hunting in the wild can yield significant new threat intelligence for those organizations bold enough to undertake it.

Hiding Online As soon as you step out on the public internet, your opponents will be able to recognize and react to you. They can easily tell who you are, where you live, and where you work. If they know you are watching them, they can react quickly and change their plans, block your access, push false information, or simply attack your computer. 

Hunting overtly is like a marked police car cruising down the street. Criminals can easily run and hide before the car gets close. To avoid this, police use plain-clothed officers in unmarked cars. You can do the same thing on the internet, but there are some tricks and pitfalls to keep in mind.

It might seem that you could simply turn on “incognito mode” in your browser and go to work. However, incognito mode only means that your browser of choice does not save a history of the sites you visit or ordinary cookies. It does not mask your IP address, advanced trackers, or browser fingerprint, which are critical identifiers to keep hidden when hunting anonymously.

Your IP address allows anyone to identify your organization. The first step to getting out of uniform online is to use an IP address that is not associated with you, your organization, or even your general location. It is important to make sure that your real IP is not leaked. Specialized tools can make this much easier.

Trackers, like cookies and supercookies, make it easy for websites to recognize you when you visit. These trackers are how websites know your account name when you visit. Advertisers also use trackers to target ads at you all over the web. While it is easy to delete normal cookies, so-called ‘supercookies’ are a different animal entirely. Because tracking techniques are always evolving, it is difficult for scrubbers to ensure all the trackers have been removed. The safest approach is to use a newly initialized and installed operating system every time you start browsing. Virtual machines (VM) allow you to do this without too much effort. By running a VM, you can create a clean image before every web session. At the end of every browsing session, you can restore your VM to the saved version, thereby eliminating all trackers along with any undetected malware you may have picked up while browsing.

Your browser has a unique fingerprint made up of all the software and plugin versions, configurations, fonts, and characteristics of your computer. Together, this data is generally unique to each visitor to a given website. Even if you do hide your IP address and remove all the supercookies, a website can still identify you by your browser fingerprint. It is impossible to completely hide your browser’s fingerprint. However, using a browser fingerprint that is shared by many other people can help obscure your identity. The most common browser fingerprint is a freshly installed operating system. From there, they diverge quickly. By using a VM, you can always appear as if you’ve newly installed your operating system. That same virtual machine image that protects against supercookies can also provide you with a generic browser fingerprint. 

By managing all of those identifiers you will successfully blend in with other internet denizens and be able to monitor online activities without drawing attention or tipping anyone off to your interest.  This should empower you to begin anonymously hunting threats in the wild, while leaving your “marked car” browser behind.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

Application Security

Open banking can be described as a perfect storm for cybersecurity. At one end, small startups with financial acumen but little or no security...

Government

The proposed UK Online Safety Bill is the enactment of two long held government desires: the removal of harmful internet content, and visibility into...

Mobile & Wireless

As smartphone manufacturers are improving the ear speakers in their devices, it can become easier for malicious actors to leverage a particular side-channel for...

Cloud Security

AWS has announced that server-side encryption (SSE-S3) is now enabled by default for all Simple Storage Service (S3) buckets.