Go to Top

Go to Top

Thumbnail for Solving Security Blind Spots
Thumbnail for Solving Security Blind Spots
Thumbnail for Solving Security Blind Spots
Thumbnail for Solving Security Blind Spots

Security Insights

Security Insights

Security Insights

What is the biggest fear for security practitioners now? Common Denominators and Solutions for Incidents

What is the biggest fear for security practitioners now? Common Denominators and Solutions for Incidents

What is the biggest fear for security practitioners now? Common Denominators and Solutions for Incidents

EnkiWhiteHat

EnkiWhiteHat

Oct 30, 2025

Oct 30, 2025

Oct 30, 2025

Content

Content

Content

"Regular inspections were conducted, but basic threat items like web shells were excluded. The details regarding server or system operation and decommissioning were unclear. Equipment with no longer supported patch updates was neglected."

The Ministry of Science and ICT has documented this in the incident report of the security breach that shook the nation at our leading telecom company in April 2025. 

This pattern is not an issue of just one company. Similar issues are recurring in major security breaches that occurred this year. Security audits were performed, but only in formality, and vulnerability patches are delayed for 'later.'

In 2025, the survey conducted by NKI White Hat at the ISEC and CSK security conferences with 454 security practitioners reveals the essence of this problem. 37% of respondents identified 'unpatched vulnerabilities' as the biggest security threat, and while 60% performed regular penetration testing, many were limited to checklist-based formal reviews.

Even incidents that large corporations couldn't prevent indicate that our company could be the next target.

Let's explore the 'actual issues on the ground' revealed by 454 security practitioners and the 'effective response strategies' suggested by white hackers.



The ransomware that security professionals fear the most

랜섬웨어 설문조사 결과

What do domestic security officers worry about the most? According to our own survey, 38% of respondents identified ransomware as their main concern. Ransomware is malicious software that encrypts valuable data such as company files, documents, and images, then demands a ransom for their access return. Thus, when employees hear that their company is hit by ransomware, they feel stifled as it leads directly to 'operational paralysis' and 'customer data theft.' 

In fact, referring to KISA's "2024 Second Half Cyber Threat Trend Report," the damage from ransomware has increased about twofold since 2020. Particularly, there are clear statistics indicating that 94% of the victims are medium and small businesses, which have more difficulty in investing in security, so the worry about ransomware among practitioners is not a vague concern.

The Start of Hacking: 'Unpatched Vulnerabilities'

보안위협 우려 원인

So where does this anxiety about ransomware start for security personnel? 

37% of survey respondents identified 'unpatched vulnerabilities' as the biggest cause. While there is certainly fear of zero-day attacks, many are more concerned about breaches that occur because patches are available but not yet applied to systems. The delay of essential security updates due to work schedules, extensive testing burdens, and staff shortages is a reality that many responsible personnel resonate with.

Just as much as these concerns weigh on their minds, such security gaps become prime targets for attackers. Attackers can leverage vulnerabilities with publicly available PoCs (Proof of Concept) to easily infiltrate systems with minimal effort and time.

The Reality of Formal Penetration Testing

모의해킹 진행여부 확인

According to the survey results, 60% of companies conduct regular penetration tests, constituting a majority. While this seems positive on the surface, many of these tests are formal checks based on checklists. Such formal inspections often overlook the actual attacker's infiltration paths, leading to effectiveness issues. This happens because they fail to completely identify the security blind spots of the company that only attackers might know. 

Therefore, penetration testing and vulnerability assessments should not merely be a 'certification process' but rather a turning point for discovering the actual risks to our systems. It is advisable to recall the purpose of the assessment and execute the checks in a way that closely mimics real attackers.

Limits of Traditional Penetration Testing and Vulnerability Assessment

모의해킹 및 취약점 점검 불편한점

The biggest barrier to conducting vulnerability assessments and penetration testing more frequently and thoroughly was not technical performance but rather 'procedural inefficiency.' In the survey, 40% of respondents said 'the preparation procedures (draft, project adoption, etc.) are cumbersome.' Every time a quick assessment is needed, they have to go through complex internal approval and reporting processes, and for large-scale assessments, it was mostly done by posting business announcements.

7 Steps of Cyber Attacks Security Managers Must Know (Web Service Vulnerability Examples)

To prepare for security threats like the above, you need to understand how attackers create breaches. Typically, an attacker goes through a seven-step process to find a company's 'loophole' and achieve the final goal of data theft. Let's explore this process in detail using penetration through web service vulnerabilities as an example.

사이버 공격 과정 7단계

1) Initial Access

This is the first step of the attack. Penetration begins in various ways such as accessing exposed management pages, exploiting vulnerabilities that have a publicly available PoC (Proof of Concept), or exploiting web service vulnerabilities. At this stage, the attacker finds attack vectors in publicly exposed web services and gains a foothold in the system by uploading files (web shells) or executing remote commands.

  • Example: The attacker exploits a vulnerability in the 1:1 consultation feature of the web service where file extension checks are insufficient, uploads a malicious file (web shell), and prepares to execute commands.

2) Privilege Escalation

After initial access, the attacker needs to expand control beyond the limited authority they initially acquire. Methods include searching for credential-related files and exploiting LPE (Local Privilege Escalation) vulnerabilities with publicly available PoCs. Even if privilege escalation is not immediately possible, the attacker can proceed to the next step.

  • Example: By executing commands through the uploaded web shell, the attacker locates credential-related files like configuration files on the server and secures root access.

3) Malware Installation and Persistence

Next, the attacker sets up an environment to maintain access, even if existing vulnerabilities are patched or the system is rebooted. They accomplish this by creating new accounts, enabling SSH, generating auto-executing services for malware, or installing backdoors and rootkits to establish 'secret passages.'

  • Example: With root access, the attacker creates a new admin account and configures remote access (SSH) so they can access the system at any time.

4) Internal Reconnaissance

After securing continuous access to the system, it's time to look internally. The attacker surveys internal assets (those not accessible externally) connected to the compromised assets by exploring accessible internal assets, conducting port scans, and searching for vulnerable services to identify the next penetration points.

  • Example: The attacker identifies the internal IP range of the occupied assets, finds the reachable IPs, conducts port scans, and determines which services are running on those IPs.

5) Lateral Movement

Using the 'map' obtained from reconnaissance, the attacker attempts to penetrate other assets like the DMZ and internal network where key data might reside. Penetration methods include using acquired credentials for access, accessing exposed internal management pages, and exploiting vulnerabilities.

  • Example: When accessing the asset running the web service, the internal server management panel is fully exposed, allowing the attacker easy access to the internal systems.

6) Privilege Escalation and Persistence (Replication)

In an effort to get closer to the final target (e.g., DB server, backup server), the attacker repeats the steps of privilege escalation and persistence on the compromised assets. This gradually increases their control over the system.

  • Example: By accessing critical servers identified through the internal server management panel, the attacker escalates privileges and installs additional malware to recreate the persistence environment.

7) Goal Achievement

Finally, the attacker reaches the final objective and achieves their goal. At this stage, the company faces the most feared consequences, such as ransomware infections or theft of critical information.

  • Example: The attacker successfully accesses the DB server and steals a large amount of sensitive personal information, such as patient data and medical records.

Four Essential Security Tips for Ethical Hackers

To neutralize such meticulously infiltrating attack scenarios, simply adding an extra firewall or a single security solution is insufficient. Therefore, it is imperative to implement the following four defense strategies from the viewpoint of the attacker.

화이트해커 핵심권고 사항

1) Avoid using illegal software

Strictly prohibiting the use of illegal software (so-called 'cracked' versions) in a corporate environment is the most basic line of defense. However, due to the considerable cost of genuine software, in reality, many small and medium-sized enterprises do not frequently purchase and use genuine software. It's crucial not to overlook that files from document software to specialized software in certain fields are highly likely to contain malware. Since such illegal software becomes a major path for infiltrating the internal network, to protect valuable internal assets, it is necessary for all employees to establish and adhere to a clear internal policy to use only genuine software.

2) Establish a robust backup strategy

Ransomware has evolved beyond just simple file encryption to simultaneously involve data theft or file theft. Accordingly, a backup strategy needs to be designed to consider 'data leakage response' as well as simple 'recovery'.

■ 3-2-1-1-0 principle

Generally, a backup based on the 3-2-1 principle is recommended, but for stronger security, it is advised to strategize with 3-2-1-1-0.
- 3 copies
- 2 types of media
- 1 off-site
- 1 immutable/offline copy
- Confirm 0 errors through regular recovery testing
In addition, to ensure the security of the backup system itself, the following actions must be taken.
Backup server accounts must be completely separate from business network accounts, MFA (multi-factor authentication) must be applied, and privileges minimized.

  • Offline management: Account information should not be stored in files and must be managed offline.

  • Network separation: To prevent the backup server from being infected with malware, it must be managed on a network completely separate from other assets.

  • Encrypt sensitive files: Considering the possibility of leaks, sensitive files must be managed by encrypting them in advance (e.g., password-protected compressed files).

3) Minimize unnecessary exposure of assets

The path for attackers to attempt initial infiltration must be fundamentally blocked. That is, it involves a systematic management of the attack surface where attackers might gain entry. The key is to minimize external exposure of unnecessary or poorly managed assets. In addition, the following actions should be taken into account immediately.
Immediate blocking and control enhancement: Assets like unused service termination assets or admin panels must immediately block external access. If found, it's essential to reinforce access control to the extreme.
Avoid using default ports: The use of default ports (such as SSH, RDP, etc.) should be avoided. If possible, these services should be deactivated, or if necessary, strict access control must be applied to reduce unnecessary attack surfaces.

4) Conduct regular penetration tests (pentests)

Penetration testing should be conducted regularly not only at the launch of new services but also for existing services. This involves simulating real attack scenarios through the security team or external experts. By identifying potential vulnerabilities in advance and taking immediate action, attack risks can be proactively reduced. The more familiar the system, the easier it is to overlook vulnerabilities, making this even more essential.

Enki WhiteHat's offer

Enki WhiteHat's OFFen Platform is designed to realistically solve these practical problems.

Key Values and Features Provided by the OFFen Platform

offen 대시보드

The OFFen platform offers key features that innovatively reduce administrative burdens while maximizing the real value of inspections as follows.

  1. Simple Request and Approval Workflow:

    • OFFen, as a subscription product, reduces the hassle of drafting and approval procedures, allowing the person in charge to request inspections with just a few clicks. It allows requests for various forms of inspections like Red Team, ASM, Offensive PT, Checklist PT to be made as needed, enhancing the tightness of vulnerability management.

  2. Real-time Attack Surface Visibility:

    • Domains, IPs, and cloud resources exposed externally are automatically collected and categorized through Enki White Hat's advanced ASM engine. This allows a clear view of Shadow IT, the hidden security blind spots. Additionally, the credibility of the collected assets is meticulously judged so that non-company related assets can be precisely classified. This allows for a clear identification of only the truly risky assets susceptible to attacks.

  3. Seamless Collaboration with Pentesters:

    • Many have experienced hesitance in asking simple questions to pentesters during a project. Now, you can freely question issues derived through commenting, lounge features. Moreover, during project progress, it's possible to receive the pentester's inspection schedule for transparent management.

  4. Simple Implementation Check:

    • Based on a created POC (Proof of Concept), you can conduct self-implementation checks with a one-click button. Furthermore, you can continuously request implementation checks from pentesters until no further vulnerabilities are detected.

Expected Effects from Introducing OFFen

Through the OFFen platform, companies can anticipate the following tangible security outcomes.

  • Reduced Administrative Burden via Subscription → Increase in Breach Prevention Rate
    With the subscription service, projects commence through purchased credits, greatly reducing cumbersome processes (proposals, approvals, etc.) and minimizing administrative burdens. As a result, it enables simultaneous securing of the inspection cycle (frequency) and depth, ultimately greatly increasing the breach prevention rate.

  • Accumulated Project History → Strengthened Internal Security Capability
    The accumulated vulnerability inspection project history within the OFFen service allows for smooth handovers even when there are changes in personnel. Moreover, the close communication established through multiple projects with white hackers complements the vulnerabilities of the internal blue team, practically enhancing security capabilities.

  • Combination of ASM and PTaaS → Integrated Security Management Possible
    Beyond managing the attack surface exposed to attackers (ASM), it is possible to manage penetration testing (PTaaS) based on these vulnerabilities from a single service. Thus, it realizes the most proactive and efficient integrated security from an attacker's perspective.

EnkiWhiteHat

EnkiWhiteHat

ENKI Whitehat
ENKI Whitehat

Offensive security experts delivering deeper security through an attacker's perspective.

Offensive security experts delivering deeper security through an attacker's perspective.

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.