VECTOR

WHAT

HOW

Man in the Middle

This is a high-impact attack and allows a black hat to sniff, capture, and replay traffic between devices and networks.

A teen accessing an illicit website may be a victim of MITM, which may intrude on the home network and gain access to a WFH device’s corporate connection through a third-party VPN connecting the WFH device to a corporate database. Once access has been gained, outgoing connections may be captured or spoofed.

Supply Chain Attack

This targets user devices while the products are in transit, and it uploads malicious services to legitimate products through physical capture or a malicious insider.

A teen that buys a phone through a third-party seller that offers a lower price may inadvertently expose the home network to malware pre-installed on the device. The malware can spread over the network to a WFH device, or possibly a WFH device could be captured in transit, have spyware installed, then put back in transit. A supply chain attack could also occur at the software level. Corporate VPNs could be hijacked before implementation at client companies, and a form of VPN spyware or data capture could be configured at the root level.