Summary
In this chapter, we highlighted a set of ideas for performing red teaming operations that might be less commonly performed but are nevertheless important to elevate the security maturity of an organization.
We discussed threats such as cryptocurrency mining, privacy violations, and targeting red and blue teams during operations. To further raise security awareness across the organization, exercises can include members of the leadership team as well. Another area we explored briefly was the manipulation of data to achieve objectives. This could be as simple as modifying telemetry to manipulate future investments, or more advanced machine learnings attacks to trick algorithms and models.
For some of the described exercises, proper planning must be done, as well as getting authorization from proper stakeholders, including legal counsel. For scenarios that are off the table and need to be done operationally, we discussed doing tabletop exercises to cover the spirit of the...