Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 18 submissions in the queue.
posted by Fnord666 on Sunday February 23 2020, @12:51PM   Printer-friendly
from the cutting-edge dept.

Pwns for sale: Scythe prepares a marketplace for sharing simulated hacks:

Scythe, a software company that spun out of the security-testing company Grimm, has been working for the past few years on a platform that allows corporate information-security teams to build security-testing campaigns—creating "synthetic malware" and crafting phishing campaigns or other attacks that mimic the techniques, tactics, and practices of known threat groups. And unlike some of the automated penetration-testing or threat-simulation products out there, Scythe retains the human in the loop—making it a useful tool to both internal security testers and external "red team" consultants.

Ars has tested earlier versions of the Scythe platform (starting in 2017, when it was still known as Crossbow), wreaking havoc on a set of victim systems in our lab and doing hands-on-keyboard things that a red team would typically do to simulate an attack. The platform allowed for the construction of "malware" that would work only on systems within a specific network-address range tailored to the task and capable of downloading additional modules of functionality once installed. The faux malware is deployable as executable files or dynamic linking libraries, allowing the emulation of more advanced malware attacks. Since it is custom generated, its signature doesn't match known malware; endpoint protection software has to catch its behaviors. (Windows 7's Windows Defender did not catch on, but my limited malware crafting skills were caught by other endpoint systems in custom campaigns I built; the packaged modules did much better in crushing my intentionally limited defenses.)

[...] At the RSA Conference this month in San Francisco, that marketplace will be officially launched. "Consultancies use us for the services they sell," Bort told Ars. "The marketplace will allow them to build their own modules." Those modules of capability can either be open source and shared freely across the platform, or the developers can resell their modules to customers or other consultancies.

The modular approach is something that's familiar to people in the security testing and research world—particularly those who've used the Metasploit framework for Web and application security testing over the years (or used it for the FBI to unmask child-porn site visitors). The big difference in Scythe's approach is that they'll be essentially available in an "app store" within Scythe's interface and ready to adapt to an organization's specific needs.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 1) by catholocism on Sunday February 23 2020, @01:54PM (1 child)

    by catholocism (8422) on Sunday February 23 2020, @01:54PM (#961388)

    Why is that? Do white penises provide a defense against digital threats?

  • (Score: 0) by Anonymous Coward on Sunday February 23 2020, @05:22PM

    by Anonymous Coward on Sunday February 23 2020, @05:22PM (#961459)

    Ask Equifax, moron.