VECTOR | WHAT | HOW |
Man in the Middle | This is a high-impact attack and allows a black hat to sniff, capture, and replay traffic between devices and networks. | A teen accessing an illicit website may be a victim of MITM, which may intrude on the home network and gain access to a WFH device’s corporate connection through a third-party VPN connecting the WFH device to a corporate database. Once access has been gained, outgoing connections may be captured or spoofed. |
Supply Chain Attack | This targets user devices while the products are in transit, and it uploads malicious services to legitimate products through physical capture or a malicious insider. | A teen that buys a phone through a third-party seller that offers a lower price may inadvertently expose the home network to malware pre-installed on the device. The malware can spread over the network to a WFH device, or possibly a WFH device could be captured in transit, have spyware installed, then put back in transit. A supply chain attack could also occur at the software level. Corporate VPNs could be hijacked before implementation at client companies, and a form of VPN spyware or data capture could be configured at the root level. |