Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Preventing Scripting Attacks on Powershell with Identity-Based Zero Trust

By Peter Smith
SEC0219-data-Feat-slide1_900px
May 4, 2020

In the U.S., scripting attacks are a fast growing vector for cybercriminals that’s already nearly as common as malware, according to the most recent Crowdstrike Global Threat Report. And it’s not just cybercriminals who are using them. Nation states such as China and Iran are also employing scripting attacks, most recently with Iran’s MechaFlounder Python backdoor attack against Turkey last year.

Why are scripting attacks growing in popularity? First, these attacks use assets that are already pervasive in enterprise environments. For example, on most *NIX systems, Python is installed by default, and PowerShell is a very common — and very powerful — administrative tool. Plus, malicious scripts are not at all hard to create. Less than 100 lines of Python code can achieve persistence in the environment, set up a back door and establish command and control, essentially giving a hacker the same access as an administrator. In fact, there are more than 200 Python backdoor scripts available for download on GitHub right now.

Let's take a closer look at one scripting attack vector: PowerShell, which is a ubiquitous admin tool used to manage IT environments. PowerShell comes with a fully developed scripting language and connects to remote systems, so it can be used to make unauthorized Internet connections and establish backchannels for command and control. This makes it a very attractive target.

PowerShell has already played a key role in many successful attacks:

  • Operation PowerShell Olympics was developed specifically to disrupt the 2018 Winter Olympics in South Korea, and it’s still circulating today. If an infected Word document is opened and the user follows the instructions in the email to enable content, a hidden PowerShell script installs malware that creates an encrypted tunnel that gives hackers remote access.
  • PowerShell is a favorite vector for delivering the Emotet trojan, which has worm-like capabilities that enable it to move laterally across the network to steal information.
  • Deep Panda, a suspected Chinese group, has used PowerShell scripts that look like regularly scheduled tasks to deliver and execute malware to a wide range of government, healthcare and business targets.

PowerShell is difficult to secure. While measures such as code signing and white listing can limit the scripts PowerShell will execute, they’re very cumbersome to control and manage. Inevitably, a vulnerability will be overlooked that can be exploited. Additionally, endpoint protection and detection platforms struggle to identify malicious scripts because they look just like ordinary administrative traffic.

Any solution for securing PowerShell and other scripting attacks must prevent the tools from being used to spread malware throughout the environment and move across it to access critical data and assets. But it must do so without making it difficult for admins to conduct ordinary day-to-day IT operations. PowerShell, Python and other vectors targeted by scripting attacks are critical tools, and security measures cripple admins’ ability to use them, some will find ways to get around or disable security measures.

 

Identify-based Zero Trust and How it Prevents Scripting Attacks

The best way to prevent scripting attacks, such as those that implement Python back doors or compromise PowerShell, is to implement identity-based zero trust. In a zero trust environment, IT treats the internal network as if it were the public internet, a place where nothing can be trusted, and anything can be a threat. In this model, instead of working to identify threats  — of which there is a limitless supply — IT identifies safe applications, workloads, hosts, devices and processes so that only approved communications are permitted. Everything else is blocked by default.

It’s important to take an identity-based approach. Legacy approaches build zero trust policies on network addresses and cannot adequately secure an environment. That’s because network addresses are short-lived in modern networks, and in environments such as the cloud or containers, they can change multiple times per second. Not only does this require that policies must be constantly updated — which requires a ton of manual intervention and has a high risk of introducing vulnerabilities with errors —  but it also means that malware and scripts can piggyback over addresses that are considered “safe.”

In an identify-based approach, each application, device or workload has a unique fingerprint based on dozens of immutable properties of the device, software or script, such as a SHA-256 hash of the binary, the UUID of the bios or a cryptographic hash of a script. By using these identities, IT can create policies that explicitly state which devices, software and scripts are allowed to communicate with one another — all other traffic is blocked by default. As a result, malicious scripts would be automatically blocked from establishing backdoors, misusing PowerShell or communicating with sensitive assets, but without hindering admins from using these tools to do their jobs.

As a result, CIOs and CSOs will sleep a lot better, knowing that the threat posed by malicious scripts has been neutralized.

KEYWORDS: cyber security data security hacking information security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Peter Smith is CEO of Edgewise Networks.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyberworld-freepik

    Why network-based zero trust doesn’t protect your most valuable assets

    See More
  • Zero-trust-freepik

    Good-bye, trust-based security – WFH may usher in the age of zero trust

    See More
  • Identity-Based Attacks Proliferate as Exposed Credentials Become More Intimate

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing