So this is my effort to consolidate references.  I often read stories the inform my opinions, but forget where the references are. So here are my first two;

DarkVishnya: Banks attacked through direct connection to local network By  on 

In 2017-2018, Kaspersky Lab specialists were invited to research a series of cybertheft incidents. Each attack had a common springboard: an unknown device directly connected to the company’s local network

and one more

The CIA’s communications suffered a catastrophic compromise. It started in Iran. November 2, 2018

U.S. officials believe that Chinese intelligence obtained physical access to the transitional, or temporary, secret communications system used by the CIA to correspond with new, unvetted sources — and broke through the firewall separating it from the main covert communications system, compromising the CIA’s entire asset network in that country, Foreign Policy reported earlier this year.

Finally, a YouTube video from info sec on some amazing physical penetration techniques;

I’ll Let Myself In: Tactics of Physical Pen Testers

Wild West Hackin’ FestPublished on Dec 11, 2017


Leave Your Comment

Your email address will not be published. Required fields are marked *

1 × 5 =