All the latest UK technology news, reviews and analysis

IT chiefs urged to tread carefully when uncovering hacking attacks

05 Feb 2013
malware virus security threat

Security firm BAE Systems Detica has advised business the most important step on discovering a cyber attack is not to let the crooks know they have been discovered.

BAE Systems Detica head of cyber security services, Tom Burton, warned that companies' strategies for dealing with cyber attacks are giving hackers an advantage because they can shift tactics was uncovered.

"We've found that almost as soon as we take action against a threat the attackers change their behaviour. It can cause them to accelerate their operations to finish their mission before you kick them out," Burton told V3.

"On some occasions we've also seen that as soon as we take action, they have implemented another far more sophisticated piece of technology because they realise they're dealing with a more sophisticated target."

As such Burton said it was important to take a more considered approach to cyber security companies to be able to deal with the problem as a whole.

"One of the first pieces of advice we give our customers when we detect a threat is actually quite counter-intuitive. We tell them don't do anything, whatever you do, don't do anything overt at the moment," said Burton.

"What you need to do is understand every single aspect of the attack, how extensive it is and what other channels there are we may not have visibility of. Otherwise it is just whack-a-mole."

Cyber security director at BAE Systems Detica, Rich Wilding echoed this by saying that even if the company successfully removes the individual threat, the attackers will likely return.

"If you just deal with the threat then leave, they don't go ‘ah, you got me' and then leave. No, they immediately come back. If you just fix the problem and think you're going to be ok, you're not as the reason for wanting to attack you doesn't go away," said Wilding.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus

Devices at work poll

Which device do you use most for work?

Popular Threads

Powered by Disqus
LG G Flex 2 hands-on review

CES 2015: LG G Flex 2 video

A closer look at LG's latest curved-screen smartphone

Updating your subscription status Loading

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button

Getting started with virtualisation

Virtualisation can help you reduce costs, improve application availability, and simplify IT
management. However, getting started can be challenging


Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

Microsoft Unified Communications Consultant

Microsoft Lync, Unified Communications, Voice, Messaging...

Agile Tester - Contract - Leeds - Scrum/.NET/SQL./Automation

Agile Tester/Scrum/.NET/SQL./Automation Leeds Contract...

Test Analyst

(Tank Recruitment, Test, Analyst, system, TQAT, ISEB...

Active Directory & Exchange Consultant

Active Directory Architecture Design and Deployment...
To send to more than one email address, simply separate each address with a comma.