'Hand-To-Hand Digital Combat' With Threat Actors

CrowdStrike CEO and co-founder George Kurtz explains how to fight attackers, not fight malware.

Sara Peters, Senior Editor

September 24, 2014

1 Min Read
Dark Reading logo in a gray background | Dark Reading

"People don't have a malware problem. They've got an adversary problem," says George Kurtz, CEO and co-founder of CrowdStrike. Last week at the Cybersecurity Summit in New York, Kurtz presented a case study of how Hurricane Panda and other organized cybercrime groups are attacking systems without using malware -- which makes them far more difficult to detect -- and how to combat them.

In lieu of malware, says Kurtz, attackers are manipulating legitimate tools like PowerShell and conducting surreptitious intelligence gathering using one-line web shells like China Chopper. This helps them blend in with regular users -- the bigger the user base, the harder it is to detect them.

According to Kurtz, organizations need more visibility into what's happening across their computing environment. Instead of just looking for "indicators of compromise" -- like malware infections, command-and-control traffic, or data exfiltration -- they need to start looking for "indicators of attack."

For example, instead of just watching for malware, companies need to watch for any sort of executable that's out of the ordinary and then dynamically respond to whatever seems suspicious. Kurtz describes it as "hand-to-hand digital combat" with an adversary.

About the Author

Sara Peters

Senior Editor

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights