Threat List & Real-World Breaches

Our mission is to help your organization protect your network and data from threats in ways that no other security system can so that you can focus on with your mission. Take a look at the below examples that highlight where we shine and other systems and processes fall short.

Layer 1

Layer 1 reasons to monitor everything that enters and exits your network with a Layer 1+ Forensic Edge Guard.

If you thought physical layer threats such as fiber taps or protocol exploitation were fiction, think again. Not only have taps occurred numerous times in the past, but they’re cheaper and easier than ever. With the potential payoffs increasing and adversary risk tolerances rising, malicious actors are no longer afraid to do whatever it takes to achieve their objectives, and this approach is no exception.

Separately, layer 1 optical overhead protocols (OTN, SDH, SONET) and Ethernet’s often forgotten layer 1 component, the Physical Coding Sublayer (PCS), present their own set of vulnerabilities that have gone entirely unrecognized for decades. With covert comms channel possibilities and terrifyingly stealthy computer network attack (CNA) vectors in the mix, we’ve made it our mission to bring these threats to light and help defend against them.

While traditional edge appliances are focused on the higher layers, missing indicators of these threats altogether, Forensic Edge Guards like L1FEguard remain vigilant, detecting threats that everything else ignores.

But you don’t have to take our word for it (though we’re certainly solid subject matter experts in this field), here are some real-world anecdotes and resources that should help drive the points home.

Data Interception Breach

From a Deloitte report in 2017: In 2000, several main trunk lines of Deutsche Telekom at Frankfurt Airport were reportedly breached, allowing data interception. Dutch and German police were victim to espionage via fiber tapping along with pharmaceutical companies in England and France. In all reality, there have been many more victims, but it’s hard to know when no one is looking…and those that find things often don’t disclose what they don’t have to.

View Deloitte Report

Fiber Eavesdropping

The Wolf Report – March 2003 “Security forces in the US discovered an illegally installed fiber eavesdropping device in Verizon’s optical network. It was placed at a mutual fund company…shortly before the release of their quarterly numbers. Information that could have been worth millions.

View Wolf Report

Optical Transport Protocol Vulnerabilities

Optical transport protocols, like all protocols, are not perfect. OTN, SDH, and SONET contain a variety of vulnerabilities that we’ve highlighted in a recent newsletter, which can be found here:

Link to newsletter1 that I haven’t written yet.

Optical Tapping

Reported in the Wall Street Journal (March 2008), roughly 4.2 million credit card details from Hannaford, a supermarket business, were stolen via optical tapping methods.

View Wall Street Journal

Ethernet Exploit

Ethernet is often thought of as a layer 2 protocol as its layer 1 component (Physical Coding Sublayer – PCS) is easy to forget…and absolutely is by every other security appliance out there. However, creative hackers find ways to exploit obscurities that others ignore. In fact, this is where they thrive…

Link to newsletter2 that I haven’t written yet.

Fiber Path Tapping

TorGuard put a great write-up together that speaks to the ease of tapping your fiber paths, along with referencing some of the disclosed real-world instances in which this has happened to victims.

View TorGuard Article

Black Hat Hacker Kevin Mitnick

World renowned black hat hacker, Kevin Mitnick, demonstrates how easy it is to tap into your fiber comms…in under 5 minutes…over a decade ago (2015)!!!!

Watch Kevin Mitnick’s Video