The Download
Like its predecessor, Cobalt Strike, Splinter, is a new tool designed for red team pen testing, but is subject to misuse by malicious actors. It enables adversaries to mimic real-world attacks, avoiding detection by deploying payloads stealthily. Splinter’s release has sparked debate over whether tools meant for defensive testing could end up empowering cybercriminals. The tool can allow attackers to infiltrate systems and escalate privileges with greater efficiency once vulnerabilities are identified.
What You Can Do
IT administrators should closely monitor their network for abnormal behavior and unusual system activity that may suggest the presence of advanced red team tools like Splinter. It is better to get in front of adversaries by running your own automated pen testing behind the firewall to see what adversaries may discover if they run Splinter or similar pen testing tools. ThreatMate automated pen testing allows you to discover vulnerabilities on networks before adversaries do.
To Learn More:
Comments