Macnica exercises specializing in targeted attacks
Launch of “Cybersecurity Workshop for Companies”

-Understanding the attackers makes it possible to understand the company's weaknesses and capture the essence of countermeasures-

Macnica (hereafter Macnica, head office location: 1-5-5 Shin-Yokohama, Kohoku-ku, Yokohama, President: Masahiro Miyabukuro), which imports, develops, and sells network equipment, is considering countermeasures against targeted attacks. From April 1, 2015, we will begin offering the "Cybersecurity Workshop for Enterprises," an exercise aimed at end-user companies that are

Targeted attacks are attacks by attackers with a clear purpose against specific companies or organizations, unlike general attacks that target an unspecified number of people. Attackers are fully aware that target companies have introduced conventional security countermeasure products, and they use techniques to evade their detection and innovate their attack methods on a daily basis.
In this way, targeted attack methods are becoming more complex and sophisticated, making it difficult to grasp the scope of countermeasures. In order not to repeat attacks and countermeasures, it is extremely important to understand the essential scope of countermeasures.

The exercise "Cybersecurity Workshop for Companies" that Macnica has started offering is aimed at end users who have already introduced conventional security products and want to understand the weaknesses of their company's security measures in countering targeted attacks. We ask engineers who are in charge of planning security measures for companies to understand the details of targeted attacks, attack methods, and attackers' aims, become aware of their company's weaknesses, and provide the essential scope of countermeasures against targeted attacks. The purpose is to help you understand.
In this service, we will explain malware's intrusion routes, methods of hiding and expanding infiltration, and attacker behavior patterns and techniques based on Kill Chain (*). We also offer specific exercises such as searching for suspicious emails among received emails.

Macnica will leverage its knowledge gained through many years of experience in security to help customers strengthen their security measures.

Outline of “Cyber Security Workshop for Companies”

venue Macnica 1-5-5 Shin-Yokohama, Minato-ku, Yokohama, Kanagawa Prefecture
time 10:00~17:00
Capacity 1 company per session (up to 5 people)
Entry fee ¥100,000/person
Target audience An engineer in charge of planning security measures for the company
Held frequency about once a month

Explanation of each step of Kill Chain

suggestion
Collect target information (organizations, business partners, etc.) from open information such as corporate sites and SNS. You can also search for legitimate servers that can be used for malware distribution and C2.
arrow
weaponization
Creating attack code (exploits) and malware (executables).
arrow
delivery
Sending an email impersonating a business partner (attack code/malware attached). Or a drive-by download by having them access a website that has been preloaded with malware.
arrow
attack
Force the user to open an attached file (PDF, Office) or access a malicious website and execute an attack code (exploit) that exploits the vulnerability.
arrow
install
Malware (executable file) is installed as a result of executing the attack code. Alternatively, install by opening the executable file attached to the email.
arrow
Remote control (C2)
Connect to the C&C server and remotely control the terminal. Download additional malware and tools as needed.
arrow
Expansion of invasion
Move around the network while building a foothold on other computers with Pass-the-Hash attacks. Download additional malware if needed.
arrow
Purpose execution
Search for the desired information, encrypt and subdivide it, and then bring it outside.

Inquiries regarding press releases

株式会社マクニカ https://www.macnica.co.jp/
TEL: 045-476-2010
〒222-8562 横浜市港北区新横浜1-5-5
広報担当 豊田(とよだ)

Inquiry form

*Company names mentioned in the text are registered trademarks or trademarks of their respective companies.