Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. The recent announcement by Russian authority Roskomnadzor regarding tighter restrictions on the use of Telegram will cause a shift in communication protocols among cyber threat-actors.

The recent announcement by Russian authority Roskomnadzor regarding tighter restrictions on the use of Telegram will cause a shift in communication protocols among cyber threat-actors.

Scheduled Pinned Locked Moved Uncategorized
cybersecuritydefensetelegramtoxwickr
6 Posts 3 Posters 17 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • anthony_kraudelt@infosec.exchangeA This user is from outside of this forum
    anthony_kraudelt@infosec.exchangeA This user is from outside of this forum
    anthony_kraudelt@infosec.exchange
    wrote on last edited by
    #1

    The recent announcement by Russian authority Roskomnadzor regarding tighter restrictions on the use of Telegram will cause a shift in communication protocols among cyber threat-actors. We may see an increased adoption of alternatives such as Tox and its variants, Wickr, and more widely used platforms like Signal.

    We all need to be staying ahead of the evolving threat-actors; otherwise, we risk falling behind.

    #cybersecurity #Defense #telegram #tox #wickr

    eingfoan@infosec.exchangeE 1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic on
    • anthony_kraudelt@infosec.exchangeA anthony_kraudelt@infosec.exchange

      The recent announcement by Russian authority Roskomnadzor regarding tighter restrictions on the use of Telegram will cause a shift in communication protocols among cyber threat-actors. We may see an increased adoption of alternatives such as Tox and its variants, Wickr, and more widely used platforms like Signal.

      We all need to be staying ahead of the evolving threat-actors; otherwise, we risk falling behind.

      #cybersecurity #Defense #telegram #tox #wickr

      eingfoan@infosec.exchangeE This user is from outside of this forum
      eingfoan@infosec.exchangeE This user is from outside of this forum
      eingfoan@infosec.exchange
      wrote on last edited by
      #2

      @Anthony_Kraudelt Hi anthony,

      How would you define stay ahead here ?

      anthony_kraudelt@infosec.exchangeA 1 Reply Last reply
      1
      0
      • eingfoan@infosec.exchangeE eingfoan@infosec.exchange

        @Anthony_Kraudelt Hi anthony,

        How would you define stay ahead here ?

        anthony_kraudelt@infosec.exchangeA This user is from outside of this forum
        anthony_kraudelt@infosec.exchangeA This user is from outside of this forum
        anthony_kraudelt@infosec.exchange
        wrote on last edited by
        #3

        @eingfoan if you have a more mature cyber security environment the use of SEIM tools to detect specific protocols or executables associated with any un-authorized applications would be appropriate. In the case of blocking at the firewall, you could implement specific rules to prevent some of these applications from connecting to outside sources. Adopting a zero trust application execution environment permitting only allow listed programs can reduce the threat of future communication channels. Lastly, don't forget to think backwards. As we start to block and defend against new forms of encrypted communication also think about the old forms such as IRC and older blog platforms which can be used for command and control of compromised systems.

        anthony_kraudelt@infosec.exchangeA 1 Reply Last reply
        1
        0
        • anthony_kraudelt@infosec.exchangeA anthony_kraudelt@infosec.exchange

          @eingfoan if you have a more mature cyber security environment the use of SEIM tools to detect specific protocols or executables associated with any un-authorized applications would be appropriate. In the case of blocking at the firewall, you could implement specific rules to prevent some of these applications from connecting to outside sources. Adopting a zero trust application execution environment permitting only allow listed programs can reduce the threat of future communication channels. Lastly, don't forget to think backwards. As we start to block and defend against new forms of encrypted communication also think about the old forms such as IRC and older blog platforms which can be used for command and control of compromised systems.

          anthony_kraudelt@infosec.exchangeA This user is from outside of this forum
          anthony_kraudelt@infosec.exchangeA This user is from outside of this forum
          anthony_kraudelt@infosec.exchange
          wrote last edited by
          #4

          @eingfoan New Release 🚀

          How MICE Threaten Cyber Security
          Money. Ideology. Curiosity. Ego.

          Understand the mindset behind modern cyber threats.

          Available now on Amazon: https://a.co/d/04Z8YD5q

          #MICE #THREATS #cyber #Cybersecurity

          gary_alderson@infosec.exchangeG 1 Reply Last reply
          0
          • anthony_kraudelt@infosec.exchangeA anthony_kraudelt@infosec.exchange

            @eingfoan New Release 🚀

            How MICE Threaten Cyber Security
            Money. Ideology. Curiosity. Ego.

            Understand the mindset behind modern cyber threats.

            Available now on Amazon: https://a.co/d/04Z8YD5q

            #MICE #THREATS #cyber #Cybersecurity

            gary_alderson@infosec.exchangeG This user is from outside of this forum
            gary_alderson@infosec.exchangeG This user is from outside of this forum
            gary_alderson@infosec.exchange
            wrote last edited by
            #5

            @Anthony_Kraudelt @eingfoan what do you think the impacts are of lone mice vs nation state efforts (basically herds of rats+) I say hacktivists pale in comparison

            anthony_kraudelt@infosec.exchangeA 1 Reply Last reply
            0
            • gary_alderson@infosec.exchangeG gary_alderson@infosec.exchange

              @Anthony_Kraudelt @eingfoan what do you think the impacts are of lone mice vs nation state efforts (basically herds of rats+) I say hacktivists pale in comparison

              anthony_kraudelt@infosec.exchangeA This user is from outside of this forum
              anthony_kraudelt@infosec.exchangeA This user is from outside of this forum
              anthony_kraudelt@infosec.exchange
              wrote last edited by
              #6

              @gary_alderson @eingfoan Gary, great question. MICE as defined in my book isn't a specific individual, but more a set of mindsets that the threat-actor uses to justify their actions. In the example of ideology which is the I, in MICE, adherence to a belief such as that of a nation-state is very important to that specific individual or group.

              Compared that to those who are motivated by money, which is the M in MICE., Financially motivated threats are typically individuals working together for their own personal gain. If you'd like to know more check out my book, available on Amazon.

              Click here: https://a.co/d/04Z8YD5q

              1 Reply Last reply
              1
              0
              • R relay@relay.infosec.exchange shared this topic
              Reply
              • Reply as topic
              Log in to reply
              • Oldest to Newest
              • Newest to Oldest
              • Most Votes


              • Login

              • Login or register to search.
              • First post
                Last post
              0
              • Categories
              • Recent
              • Tags
              • Popular
              • World
              • Users
              • Groups