Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Get bent on cyber intent

Use cyber intent to disrupt attacks before they start

By GS McNamara
The Long and Winding Road to Cyber Recovery
November 12, 2020

The cyber intent strategy is to seek out the reconnaissance traffic that precedes an attack and manipulate it so well that the attack never succeeds. Leveraging and countering malicious cyber intent as your earliest defense draws from information warfare. Investing a small misdirection here could pay dividends later.

The opportunity to harness and change the outcome of an attack based on perceiving malicious intent during the very first stage of an attack is often overlooked. When this type of traffic is simply blocked the opportunity to do more with it is lost. In the best-case scenario, the successful application of a cyber intent strategy completely disrupts an imminent attack. In the worst-case scenario cyber intent-powered defenses elevate the stealthy adversary to pop up on the radar of traditional security defenses.

 

Why start here?

If you ask three cybersecurity subject matter experts to list the stages of a cyberattack you will get three different answers. But we don’t care because Reconnaissance leads all three:
 

Reconnaissance

Initial Reconnaissance

Reconnaissance

Incursion

Initial Compromise

Weaponization
Discovery

Establish Foothold

Delivery
Capture

Escalate Privileges

Exploitation

Exfiltration

Internal Reconnaissance

Installation

 

Move Laterally

Command & Control (C2)

 

Maintain Presence

Actions on Objectives
 

Complete Mission

 

 

WordPress

WordPress is no longer just a humble blogging platform but now powers 38% of the internet according to w3techs.com. WordPress also supports large sites such as The White House, Fortune, Walt Disney, and even some eCommerce. WordPress is just today’s example, but the same lessons can be applied to the name brand products you are running within your enterprise and the attack strategies carry over.

A hacker’s usual approach to breaching WordPress sites includes using a legitimate security tool like WPScan to discover usernames as well as installed plugins and themes. The attacker then tries to brute force passwords for the previously discovered user accounts. At the same time, they check exploit databases for known vulnerabilities in any of the installed plugins and themes, and then try to hack in through those if account access cannot be obtained.

 

Why not block it

When this type of traffic is detected, the common approach is to simply block it. But the biggest drawback we care about with this is the incredibly short feedback loop for the adversary – they know immediately that they were blocked and when their gathering of high-fidelity intelligence was terminated. To circumvent this, they might switch IP addresses, rate limit their requests, or just come back later. They build a bigger and bigger picture of your attack surface and security posture. They amass pieces slowly, but each of those pieces of intelligence are trustworthy.

 

Disrupt the intelligence gathering

So why not disrupt the information gathering step of the attack? It is entirely possible to disrupt the Tactics, Techniques, and Procedures (TTPs) such as username discovery and the enumeration of plugins and themes. So, when the attacker scans for usernames, return ones that don’t exist. When they scan for any of 88.5k+ known plugins that might be installed, respond indicating that they are all installed. The same goes for when they scan for 400+ themes.

In this scenario the attacker gathers an overwhelming amount of what they think is high quality intelligence. Usually their problem is too little intelligence. They’ll blindly launch attacks against accounts, plugins, and themes that don’t exist, so the exploits will never work.

 

Turn up the heat

There are lasting benefits to misleading the adversary into thinking that they succeeded in gathering quality intelligence. They move on to step 2 of their attack without knowing they already failed in step 1.

Building upon our example, if they use the “discovered” usernames to attempt to gain access themselves they will hit a wall when the credentials don’t work no matter how many passwords they try. At this point they may think that there is a bug in their tools or maybe the administrator is onto them already. They wouldn’t think to question whether the discovered usernames even exist. That’s inconceivable, because it’s never been something they’d have questioned before.

This is a much longer, taxing feedback loop and the attackers don’t know where in the process things went wrong. They will become frustrated and start to make mistakes in their attempts to rectify this, becoming increasingly noisy, reckless, and easier to detect for traditional security defenses. This brings their stealthy efforts to the surface. Otherwise, this intelligence gathering activity could have gone under the radar and the attack executed with incredible precision.

 

Security through obscurity

At this point some readers are probably asking themselves “Isn’t this just security through obscurity?” No, there’s a subtle but important difference that can be distilled down to:

  • Security through obscurity is denying information to the adversary
  • Information warfare is supplying false, but believable information to the adversary

By leveraging cyber intent, we get them to make decisions against their own interest without being aware.

 

Tactics, Techniques, and Procedures (TTPs)

David J Bianco’s concept of the Pyramid of Pain is hyper relevant here. If we use his Pyramid as a guide, exploiting cyber intent for pre-attack protection allows us to defend at the most elite level: Tactics, Techniques, and Procedures (TTPs).

“When you detect and respond at this level, you are operating directly on adversary behaviors, not against their tools. From a pure effectiveness standpoint, this level is your ideal.... you force them to do the most time-consuming thing possible: learn new behaviors.” David writes on his site detect-respond.blogspot.com.

Eventually the repeated disruptions will make the adversary reinvent themselves or give up completely.

 

The cybercriminal economy

Let’s take a step back to see the big picture and how this could undermine the cybercriminal economy using just our credential discovery example. If the attacker is in the business of selling stolen credentials then there are potential long-term consequences to their reputation, and by extension, revenue. Like any business, reputation matters. When an esteemed underground seller starts selling degraded information, their customers will begin to desert them.

This presents two threats to their business overall: obviously the first is immediate and is the lost revenue, but the second is more insidious, and is cost. To gain customer trust back the seller needs to better validate the information they are trying to sell. They may never have had to do this before because the stolen credentials just worked. Now they need to figure out what to do to continue the profitable operations to which they are accustomed. If they have to go back and somehow recheck every stolen credential they are trying to sell, this consumes time and money. Eventually time or money are exhausted, and it is no longer feasible to harvest and sell credentials, and their business collapses.

Disrupting the cybercriminal economy is the long game. But you can benefit immediately by building a cyber intent strategy. Start using cyber intent today to Deny, Disinform, and Document attacks right from their beginning.

 

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: cyber security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Headshot   gsmcnamara

GS McNamara, MS, uses his offensive security background to get into the mindset of the adversary and study their weaknesses. He develops the open source Floodspark Cyber Espionage Firewall (CEF) portfolio to turn the idea of cyber intent into reality. Reach out today: https://www.linkedin.com/in/gsmcnamara/ or gs@floodspark.com

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber security freepik

    The fight against cyber threats requires a public-private partnership. Here’s how to get it done.

    See More
  • SaaS-security-freepik

    Why security leaders are concerned about the SaaS sprawl, and how to get a grip on it

    See More
  • police1-900px.jpg

    Minneapolis City Council Members Announce Intent to Disband Police Department, Invest in Community-Led Public Safety

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • September 3, 2024

    From DDoS Protection to WAAP: How Layered Protection Enhances Your Cybersecurity Strategy

    ON DEMAND: By participating in the webinar, attendees will gain enhanced knowledge of cyber threats and understand the current spectrum of cyber threats facing businesses.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!