OSINT & ASM: Do you know your company as well as the attackers?

In this article

There's a scary saying in cybersecurity: «Attackers only need to be right once. You need to be right 100% of the time.»

But it gets worse. Attackers often know your network better than you do. Before they've even launched a single line of malicious code, they've already mapped your forgotten servers, your exposed technical documents and your test subdomains.

How can we help? Thanks to the’OSINT (Open Source Intelligence) and a discipline you urgently need to master: the’ASM (Attack Surface Management).

The tip of the iceberg: Shadow IT

If you ask your CIO to draw your network, he'll show you a clean diagram: the headquarters, the VPN, the secure production servers. This is the theoretical surface.

Visit real surface, the one the attackers see, is often much larger and more chaotic. This is what we call the Shadow IT :

  • A «pre-prod» server hastily set up by a developer 6 months ago and never switched off.
  • A public Trello or Notion table containing Wi-Fi identifiers.
  • A test.votre-entreprise.com sub-domain pointing to an unsecured administration interface.
  • GitHub code repositories containing API keys in plain text.

For an attacker, these are open doors that won't trigger any alarms on your main firewall.

Your IT iceberg
Your IT iceberg

80% of the attack takes place before the intrusion

Ransomware groups don't strike at random. They spend weeks in the Recognition. They use OSINT techniques to scan everything belonging to your company on the public web.

They're not looking to break through your armored door (your main firewall). They're looking for the cellar window left ajar (that forgotten obsolete server).

If you don't keep an eye on your external attack surface, you give them a considerable head start.

Adopt the Attacker's View

This is where ASM (Attack Surface Management) comes in. Unlike a pentest (penetration test), which is a snapshot at a given moment in time, ASM is continuous video surveillance.
The aim is to continuously map your digital footprint to detect anomalies before they are exploited:

  1. Discovery Scan the whole Internet to find your assets (IPs, Domains, Certificates).
  2. Analysis Identify vulnerabilities (open RDP port, information leakage).
  3. Prioritization Correct critical issues immediately.

Phishia gives you visibility

At Phishia, We believe that the best defense is a thorough knowledge of your territory. Our services are not limited to raising awareness: we act as a control tower.

Via our’Audit and Risk Analysis, With our CTI technology, we do the mapping for you. We scan the web with the same tools as the attackers to tell you exactly what's sticking out.

Don't let a forgotten server become the entry point to your next crisis.

Discover how Phishia reduces your attack surface: 

In this article

en_US