You may not be able to see it, but the invisible threat is the latest trend being used by cyberattackers. Neither your firewall, your IDS/IPS nor antivirus can prevent this attack because often no malware is involved.

Although this is not a new attack technique, the Dell SecureWorks Incident Response Team has found that in more than half of its engagements in the past year, attackers entered networks using no malware or just one malware sample alone that they then hide. Once inside, attackers use administrative tools native to the network to navigate throughout it, discovering and stealing valuable information. By not brining any new tools or other malware into the system, the attackers can stay under the radar for months. Think about how much information they may have access to in that time, especially in law firms and legal departments.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Advance® Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]