Blog
/
/
May 28, 2019

[Part 2] Top Cyber Hygiene Issues Leading to a Breach

Spotting cyber hygiene issues caused by a lapse of attention requires AI tools that alert critical changes to network activity. Read part two here!
Inside the SOC
Darktrace cyber analysts are world-class experts in threat intelligence, threat hunting and incident response, and provide 24/7 SOC support to thousands of Darktrace customers around the globe. Inside the SOC is exclusively authored by these experts, providing analysis of cyber incidents and threat trends, based on real-world experience in the field.
Written by
Max Heinemeyer
Global Field CISO
Default blog imageDefault blog imageDefault blog imageDefault blog imageDefault blog imageDefault blog image
28
May 2019

Read the first part: Part one — A perimeter in ruins

Earlier this month, I discussed some of the most critical challenges that today’s institutions face in their efforts to reinforce the network perimeter. Eliminating common attack vectors, from unauthorized uploads in the cloud to outdated protocol usage on-premise, is an essential step toward a more secure digital future.

Ultimately, however, I concluded that even flawless cyber hygiene at the perimeter will never be a panacea for all possible cyber-threats, since defenders cannot possibly address vulnerabilities about which they aren’t yet aware. Building strong borders is vital, clearly, but as attackers continue to launch novel attacks, even 50-foot walls are imperiled by 50-foot ladders.

Of course, such concerns become merely academic when your walls aren’t placed correctly, or watched attentively, or expanded when the digital estate grows. For countless employees and organizations alike, the allure of convenience has weakened the perimeter in all of these ways and more, rendering the work of cyber-criminals exponentially easier. Yet given the complexity of the modern enterprise, discovering exactly where users have cut corners is often difficult for human security teams alone. Spotting cyber hygiene issues caused by a lack of due diligence — like the five detailed below — therefore requires AI tools that alert on critical changes to network activity in real time.

Issue #6: Not keeping an inventory of hardware on the network

As all manner of non-traditional IT makes its way into workplaces around the world, keeping an inventory of these seamlessly integrated devices often proves an arduous undertaking, one that many organizations shirk altogether. Between app-controlled thermostats and smart refrigerators, connected cameras and Bluetooth sensors, few security teams possess a rigorous list of the hardware under their care.

Yet attaining 100% network visibility is a prerequisite to any viable security posture. Attackers are increasingly targeting poorly secured IoT devices to bypass the perimeter at its weakest points, before moving laterally to compromise more sensitive databases and machines. By analyzing all traffic from the entire enterprise, Darktrace detects when new devices come online and alert on any unusual activity from them with its AI models, some of which are:

  • Device / New Device with Attack Tools
  • Unusual Activity / Anomalous SMB Read & Write from New Device
  • Unusual Activity / Sustained Unusual Activity from New Device
  • Unusual Activity / Unusual Activity from New Device

Issue #7: Using corporate devices for private use

While the divide between corporate and private networks is a primary facet of cyber hygiene, few employees are immune to the temptation and convenience of using company devices for personal use. Whether it’s torrenting movies, visiting social media websites, or checking personal email accounts during the workday, these activities all expose carefully guarded corporate environments to ones that are far less secure. At the same time, many organizations lack visibility over their own online traffic, preventing their security teams from catching such risky behavior until it’s already too late.

Employees have also been known to violate internal compliance policies by downloading unauthorized software for private purposes, which introduces serious security risks and opens the door for supply chain attacks. Darktrace has detected a plethora of threats related to such downloads across our customer base, including outdated software, network scanners, BitTorrent clients, and crypto-mining programs. Such compliance issues trigger a number of Darktrace’s behavioral models, for example:

  • Anomalous File / EXE from Rare External Location
  • Anomalous File / Incoming RAR File
  • Compliance / BitTorrent
  • Compliance / Crypto Currency Mining Activity

To bypass compliance policies and access resources blocked by network administrators, employees often turn to VPNs as well as onion routing services like Tor, which facilitate anonymous communication. These services are equivalent to inhibiting security controls on the offending device; consequently, companies must have the ability to detect and terminate them whenever they are used on the network. Because Darktrace provides 100% visibility across the digital infrastructure, it can flag private VPN and Tor sessions with the following example models:

  • Anomalous Connection / New Outbound VPN
  • Compliance / Privacy VPN
  • Compliance / Tor Usage

Darktrace detected one such case earlier this year wherein a corporate device connected to a third-party VPN. Although this activity is not inherently risky or threatening in all situations, Darktrace’s understanding of the company’s network revealed that the device was the only one using the VPN — strongly suggesting a compliance violation. Moreover, when the device was not using the VPN service, it was seen making a large amount of HTTP post requests to another rare destination and displaying other signs of infection. It turned out that the device was infected with the elusive Ursnif trojan.

Figure 1: Darktrace’s external site summary showing that only one device in the network connected to the VPN.

Issue #8: Lack of strong access management

Ensuring that only rightful users have access to private company resources is a foundational component of cyber security. Yet as these users and their privileges continuously evolve, maintaining strong access management can be time-consuming and difficult.

Out of all the users in the network, the accounts to which the most attention should be paid are those with administrator or root privileges. While it is common to keep a tight control on high-privilege accounts, there are still organizations that find it hard to manage the access control well, making their devices more vulnerable to both malware and insider threats. In fact, even well-intentioned insiders can jeopardize the organization in the absence of strong access management, such as employees who download unauthorized software without understanding its associated risks.

Darktrace has a list of models to detect the unusual usage of credentials, including:

  • User / New Admin Credentials on Client
  • User / Overactive User Credential
  • SaaS / Unusual SaaS Administration

Issue #9: TFTP Usage

Trivial File Transfer Protocol (TFTP) is an application layer protocol commonly employed to transfer files between devices. Due to its relatively simplistic design and easy implementation, TFTP was very popular in the past. In the context of today’s sophisticated cyber-threats, however, TFTP has become highly insecure. Among the protocol’s numerous weaknesses from a cyber hygiene perspective is its lack of authentication mechanisms, a flaw which allows essentially anyone to read and write resources on the exposed device.

Darktrace’s Compliance / External TFTP model enables network administrators to detect any incoming TFTP connections from external IP addresses that don’t normally connect to the network. Crucially, Darktrace AI’s understanding what constitutes “normal” versus “abnormal” for each particular network serves to differentiate the most serious threats, as TFTP connections from a rare IP address are much more likely to be malicious than similar connections between known IP addresses on the network.

TFTP is just one example of insecure protocol usage – Darktrace monitors for the abnormal usage of various other attack-prone protocols as well. Another example is Telnet.

Issue #10: Unencrypted data transferred between internal and external devices

While encrypting communication can be a hassle, cleartext messages are liable to be intercepted or even altered by malicious actors — with potentially devastating ramifications. Indeed, Darktrace’s Compliance / FTP / Unusual Outbound FTP model has frequently flagged credentials being sent via unencrypted channels, which attackers could have used to access privileged resources within the company’s network.

In the first few months of 2019, Darktrace detected an unusual connection made to an external device on port 1414 using the IBM WebSphere MQ Protocol. When potentially sensitive information was transmitted in cleartext, Darktrace AI alerted the customer in real time.

Figure 2: Packet capture showing that potential sensitive information was captured

Sacrificing convenience for security in these most egregious cases remains the foundation of robust cyber hygiene, whether that means not torrenting Shrek 2 on a work laptop or taking inventory of the smart juicer in the office kitchen. Of course, just as no perimeter defenses are formidable enough to keep motivated attackers at bay, so too is there no level of due diligence sufficient to close off all possible attack vectors or ensure that all employees are compliant with internal policies. With cyber AI defenses like Darktrace, security teams have an extra set of eyes watching out for poor cyber hygiene practices across the entire digital infrastructure, empowering them to grow those infrastructures with confidence.

Inside the SOC
Darktrace cyber analysts are world-class experts in threat intelligence, threat hunting and incident response, and provide 24/7 SOC support to thousands of Darktrace customers around the globe. Inside the SOC is exclusively authored by these experts, providing analysis of cyber incidents and threat trends, based on real-world experience in the field.
Written by
Max Heinemeyer
Global Field CISO

More in this series

No items found.

Blog

/

Cloud

/

June 12, 2025

Breaking Silos: Why Unified Security is Critical in Hybrid World

laptop with statistics on itDefault blog imageDefault blog image

Hybrid environments demand end-to-end visibility to stop modern attacks

Hybrid environments are a dominant trend in enterprise technology, but they continue to present unique issues to the defenders tasked with securing them. By 2026, Gartner predicts that 75% of organizations will adopt hybrid cloud strategies [1]. At the same time, only 23% of organizations report full visibility across cloud environments [2].

That means a strong majority of organizations do not have comprehensive visibility across both their on-premises and cloud networks. As a result, organizations are facing major challenges in achieving visibility and security in hybrid environments. These silos and fragmented security postures become a major problem when considering how attacks can move between different domains, exploiting the gaps.

For example, an attack may start with a phishing email, leading to the compromise of a cloud-based application identity and then moving between the cloud and network to exfiltrate data. Some attack types inherently involve multiple domains, like lateral movement and supply chain attacks, which target both on-premises and cloud networks.

Given this, unified visibility is essential for security teams to reduce blind spots and detect threats across the entire attack surface.

Risks of fragmented visibility

Silos arise due to separate teams and tools managing on-premises and cloud environments. Many teams have a hand in cloud security, with some common ones including security, infrastructure, DevOps, compliance, and end users, and these teams can all use different tools. This fragmentation increases the likelihood of inconsistent policies, duplicate alerts, and missed threats. And that’s just within the cloud, not even considering the additional defenses involved with network security.

Without a unified security strategy, gaps between these infrastructures and the teams which manage them can leave organizations vulnerable to cyber-attacks. The lack of visibility between on-premises and cloud environments contributes to missed threats and delayed incident response. In fact, breaches involving stolen or compromised credentials take an average of 292 to identify and contain [3]. That’s almost ten months.

The risk of fragmented visibility runs especially high as companies undergo cloud migrations. As organizations transition to cloud environments, they still have much of their data in on-premises networks, meaning that maintaining visibility across both on-premises and cloud environments is essential for securing critical assets and ensuring seamless operations.

Unified visibility is the solution

Unified visibility is achieved by having a single-pane-of-glass view to monitor both on-premises and cloud environments. This type of view brings many benefits, including streamlined detection, faster response times, and reduced complexity.

This can only be accomplished through integrations or interactions between the teams and tools involved with both on-premises security and cloud security.

AI-driven platforms, like Darktrace, are especially well equipped to enable the real-time monitoring and insights needed to sustain unified visibility. This is because they can handle the large amounts of data and data types.

Darktrace accomplishes this by plugging into an organization’s infrastructure so the AI can ingest and analyze data and its interactions within the environment to form an understanding of the organization’s normal behavior, right down to the granular details of specific users and devices. The system continually revises its understanding about what is normal based on evolving evidence.

This dynamic understanding of normal means that the AI engine can identify, with a high degree of precision, events or behaviors that are both anomalous and unlikely to be benign. This helps reduce noise while surfacing real threats, across cloud and on-prem environments without manual tuning.

In this way, given its versatile AI-based, platform approach, Darktrace empowers security teams with real-time monitoring and insights across both the network and cloud.

Unified visibility in the modern threat landscape

As part of the Darktrace ActiveAI Security Platform™, Darktrace / CLOUD works continuously across public, private, hybrid, and multi-cloud deployments. With real-time Cloud Asset Enumeration and Dynamic Architecture Modeling, Darktrace / CLOUD generates up-to-date architecture diagrams, giving SecOps and DevOps teams a unified view of cloud infrastructures.

It is always on the lookout for changes, driven by user and service activity. For example, unusual user activity can significantly raise the asset’s score, prompting Darktrace’s AI to update its architectural view and keep a living record of the cloud’s ever-changing landscape, providing near real-time insights into what’s happening.

This continuous architectural awareness ensures that security teams have a real-time understanding of cloud behavior and not just a static snapshot.

Darktrace / CLOUD’s unified view of AWS and Azure cloud posture and compliance over time.
Figure 1. Darktrace / CLOUD’s unified view of AWS and Azure cloud posture and compliance over time.

With this dynamic cloud visibility and monitoring, Darktrace / CLOUD can help unify and secure environments.

Real world example: Remote access supply chain attacks

Sectop Remote Access Trojan (RAT) malware, also known as ‘ArchClient2,’ is a .NET RAT that contains information stealing capabilities and allows threat actors to monitor and control targeted computers. It is commonly distributed through drive-by downloads of illegitimate software via malvertizing.

Darktrace has been able to detect and respond to Sectop RAT attacks using unified visibility and platform-wide coverage. In one such example, Darktrace observed one device making various suspicious connections to unusual endpoints, likely in an attempt to receive C2 information, perform beaconing activity, and exfiltrate data to the cloud.

This type of supply chain attack can jump from the network to the cloud, so a unified view of both environments helps shorten detection and response times, therefore mitigating potential impact. Darktrace’s ability to detect these cross-domain behaviors stems from its AI-driven, platform-native visibility.

Conclusion

Organizations need unified visibility to secure complex, hybrid environments effectively against threats and attacks. To achieve this type of comprehensive visibility, the gaps between legacy security tools across on-premises and cloud networks can be bridged with platform tools that use AI to boost data analysis for highly accurate behavioral prediction and anomaly detection.

Read more about the latest trends in cloud security in the blog “Protecting Your Hybrid Cloud: The Future of Cloud Security in 2025 and Beyond.”

References:

1. Gartner, May 22, 2023, “10 Strategic Data and Analytics Predictions Through 2028

2. Cloud Security Alliance, February 14, 2024, “Cloud Security Alliance Survey Finds 77% of Respondents Feel Unprepared to Deal with Security Threats

3. IBM, “Cost of a Data Breach Report 2024

Continue reading
About the author
Pallavi Singh
Product Marketing Manager, OT Security & Compliance

Blog

/

OT

/

June 11, 2025

Proactive OT security: Lessons on supply chain risk management from a rogue Raspberry Pi

man working on computerDefault blog imageDefault blog image

Understanding supply chain risk in manufacturing

For industries running Industrial Control Systems (ICS) such as manufacturing and fast-moving consumer goods (FMCG), complex supply chains mean that disruption to one weak node can have serious impacts to the entire ecosystem. However, supply chain risk does not always originate from outside an organization’s ICS network.  

The implicit trust placed on software or shared services for maintenance within an ICS can be considered a type of insider threat [1], where defenders also need to look ‘from within’ to protect against supply chain risk. Attackers have frequently mobilised this form of insider threat:

  • Many ICS and SCADA systems were compromised during the 2014 Havex Watering Hole attack, where via operators’ implicit trust in the trojanized versions of legitimate applications, on legitimate but compromised websites [2].
  • In 2018, the world’s largest manufacturer of semiconductors and processers shut down production for three days after a supplier installed tainted software that spread to over 10,000 machines in the manufacturer’s network [3].
  • During the 2020 SolarWinds supply chain attack, attackers compromised a version of Orion software that was deployed from SolarWinds’ own servers during a software update to thousands of customers, including tech manufacturing companies such as Intel and Nvidia [4].

Traditional approaches to ICS security have focused on defending against everything from outside the castle walls, or outside of the ICS network. As ICS attacks become more sophisticated, defenders must not solely rely on static perimeter defenses and prevention. 

A critical part of active defense is understanding the ICS environment and how it operates, including all possible attack paths to the ICS including network connections, remote access points, the movement of data across zones and conduits and access from mobile devices. For instance, original equipment manufacturers (OEMs) and vendors often install remote access software or third-party equipment in ICS networks to facilitate legitimate maintenance and support activities, which can unintentionally expand the ICS’ attack surface.  

This blog describes an example of the convergence between supply chain risk and insider risk, when a vendor left a Raspberry Pi device in a manufacturing customer’s ICS network without the customer’s knowledge.

Case study: Using unsupervised machine learning to detect pre-existing security issues

Raspberry Pi devices are commonly used in SCADA environments as low-cost, remotely accessible data collectors [5][6][7]. They are often paired with Industrial Internet of Things (IIoT) for monitoring and tracking [8]. However, these devices also represent a security risk because their small physical size and time-consuming nature of physical inspection makes them easy to overlook. This poses a security risk, as these devices have previously been used to carry out USB-based attacks or to emulate Ethernet-over-USB connections to exfiltrate sensitive data [8][9].

In this incident, a Darktrace customer was unaware that their supplier had installed a Raspberry Pi device on their ICS network. Crucially, the installation occurred prior to Darktrace’s deployment on the customer’s network. 

For other anomaly detection tools, this order of events meant that this third-party device would likely have been treated as part of the customer’s existing infrastructure. However, after Darktrace was deployed, it analyzed the metadata from the encrypted HTTPS and DNS connections that the Raspberry Pi made to ‘call home’ to the supplier and determined that these connections were  unusual compared to the rest of the devices in the network, even in the absence of any malicious indicators of compromise (IoCs).  

Darktrace triggered the following alerts for this unusual activity that consequently notified the customer to the pre-existing threat of an unmanaged device already present in their network:

  • Compromise / Sustained SSL or HTTP Increase
  • Compromise / Agent Beacon (Short Period)
  • Compromise / Agent Beacon (Medium Period)
  • Compromise / Agent Beacon (Long Period)
  • Tags / New Raspberry Pi Device
  • Device / DNS Requests to Unusual Server
  • Device / Anomaly Indicators / Spike in Connections to Rare Endpoint Indicator
Darktrace’s External Sites Summary showing the rarity of the external endpoint that the Raspberry Pi device ‘called home’ to and the model alerts triggered.  
Figure 1: Darktrace’s External Sites Summary showing the rarity of the external endpoint that the Raspberry Pi device ‘called home’ to and the model alerts triggered.  

Darktrace’s Cyber AI Analyst launched an autonomous investigation into the activity, correlating related events into a broader incident and generating a report outlining the potential threat along with supporting technical details.

Darktrace’s anomaly-based detection meant that the Raspberry Pi device did not need to be observed performing clearly malicious behavior to alert the customer to the security risk, and neither can defenders afford to wait for such escalation.

Why is this significant?

In 2021 a similar attack took place. Aiming to poison a Florida water treatment facility, attackers leveraged a TeamViewer instance that had been dormant on the system for six months, effectively allowing the attacker to ‘live off the land’ [10].  

The Raspberry Pi device in this incident also remained outside the purview of the customer’s security team at first. It could have been leveraged by a persistent attacker to pivot within the internal network and communicate externally.

A proactive approach to active defense that seeks to minimize and continuously monitor the attack surface and network is crucial.  

The growing interest in manufacturing from attackers and policymakers

Significant motivations for targeting the manufacturing sector and increasing regulatory demands make the convergence of supply chain risk, insider risk, and the prevalence of stealthy living-off-the-land techniques particularly relevant to this sector.

Manufacturing is consistently targeted by cybercriminals [11], and the sector’s ‘just-in-time’ model grants attackers the opportunity for high levels of disruption. Furthermore, under NIS 2, manufacturing and some food and beverage processing entities are now designated as ‘important’ entities. This means stricter incident reporting requirements within 24 hours of detection, and enhanced security requirements such as the implementation of zero trust and network segmentation policies, as well as measures to improve supply chain resilience [12][13][14].

How can Darktrace help?

Ultimately, Darktrace successfully assisted a manufacturing organization in detecting a potentially disruptive 'near-miss' within their OT environment, even in the absence of traditional IoCs.  Through passive asset identification techniques and continuous network monitoring, the customer improved their understanding of their network and supply chain risk.  

While the swift detection of the rogue device allowed the threat to be identified before it could escalate, the customer could have reduced their time to respond by using Darktrace’s built-in response capabilities, had Darktrace’s Autonomous Response capability been enabled.  Darktrace’s Autonomous Response can be configured to target specific connections on a rogue device either automatically upon detection or following manual approval from the security team, to stop it communicating with other devices in the network while allowing other approved devices to continue operating. Furthermore, the exportable report generated by Cyber AI Analyst helps security teams to meet NIS 2’s enhanced reporting requirements.  

Sophisticated ICS attacks often leverage insider access to perform in-depth reconnaissance for the development of tailored malware capabilities.  This case study and high-profile ICS attacks highlight the importance of mitigating supply chain risk in a similar way to insider risk.  As ICS networks adapt to the introduction of IIoT, remote working and the increased convergence between IT and OT, it is important to ensure the approach to secure against these threats is compatible with the dynamic nature of the network.  

Credit to Nicole Wong (Principal Cyber Analyst), Matthew Redrup (Senior Analyst and ANZ Team Lead)

[related-resource]

Appendices

MITRE ATT&CK Mapping

  • Infrastructure / New Raspberry Pi Device - INITIAL ACCESS - T1200 Hardware Additions
  • Device / DNS Requests to Unusual Server - CREDENTIAL ACCESS, COLLECTION - T1557 Man-in-the-Middle
  • Compromise / Agent Beacon - COMMAND AND CONTROL - T1071.001 Web Protocols

References

[1] https://www.cisa.gov/topics/physical-security/insider-threat-mitigation/defining-insider-threats

[2] https://www.trendmicro.com/vinfo/gb/threat-encyclopedia/web-attack/139/havex-targets-industrial-control-systems

[3]https://thehackernews.com/2018/08/tsmc-wannacry-ransomware-attack.html

[4] https://www.theverge.com/2020/12/21/22194183/intel-nvidia-cisco-government-infected-solarwinds-hack

[5] https://www.centreon.com/monitoring-ot-with-raspberry-pi-and-centreon/

[6] https://ieeexplore.ieee.org/document/9107689

[7] https://www.linkedin.com/pulse/webicc-scada-integration-industrial-raspberry-pi-devices-mryff

[8] https://www.rowse.co.uk/blog/post/how-is-the-raspberry-pi-used-in-the-iiot

[9] https://sepiocyber.com/resources/whitepapers/raspberry-pi-a-friend-or-foe/#:~:text=Initially%20designed%20for%20ethical%20purposes,as%20cyberattacks%20and%20unauthorized%20access

[10] https://edition.cnn.com/2021/02/10/us/florida-water-poison-cyber/index.html

[11] https://www.mxdusa.org/2025/02/13/top-cyber-threats-in-manufacturing/

[12] https://www.shoosmiths.com/insights/articles/nis2-what-manufacturers-and-distributors-need-to-know-about-europes-new-cybersecurity-regime

[13] https://www.goodaccess.com/blog/nis2-require-zero-trust-essential-security-measure#zero-trust-nis2-compliance

[14] https://logisticsviewpoints.com/2024/11/06/the-impact-of-nis-2-regulations-on-manufacturing-supply-chains/

Continue reading
About the author
Nicole Wong
Cyber Security Analyst
Your data. Our AI.
Elevate your network security with Darktrace AI