
Sign up to save your podcasts
Or


Privilege escalation attacks represent one of the most dangerous cybersecurity threats facing organizations today. In this episode of The Backup Wrap-Up, we analyze how threat actors use initial access to gain higher privileges and compromise entire networks. Through examples from Mr. Robot, we explore both vertical privilege escalation (exploiting vulnerabilities for admin access) and horizontal attacks (spreading through shared systems). Learn why backup administrators often become prime targets for privilege escalation and how proper security controls can prevent these attacks. We discuss real-world cases including the Target breach via HVAC systems and recent ransomware campaigns using social engineering for privilege escalation. Discover how IoT devices create attack vectors, why physical security remains crucial, and how immutable backups protect against privilege escalation attempts. Perfect for IT professionals seeking to understand and defend against these sophisticated attack methods.
Mentioned in the episode:
https://www.backupwrapup.com/tape-drive-designer-schools-mr-backup-on-tape/
https://www.backupwrapup.com/red-team-cyber-security-strategies/
Pre-order Learning Ransomware Response & Recovery: https://www.amazon.com/Learning-Ransomware-Response-Recovery-Stopping/dp/1098169581
By W. Curtis Preston (Mr. Backup)4.7
2626 ratings
Privilege escalation attacks represent one of the most dangerous cybersecurity threats facing organizations today. In this episode of The Backup Wrap-Up, we analyze how threat actors use initial access to gain higher privileges and compromise entire networks. Through examples from Mr. Robot, we explore both vertical privilege escalation (exploiting vulnerabilities for admin access) and horizontal attacks (spreading through shared systems). Learn why backup administrators often become prime targets for privilege escalation and how proper security controls can prevent these attacks. We discuss real-world cases including the Target breach via HVAC systems and recent ransomware campaigns using social engineering for privilege escalation. Discover how IoT devices create attack vectors, why physical security remains crucial, and how immutable backups protect against privilege escalation attempts. Perfect for IT professionals seeking to understand and defend against these sophisticated attack methods.
Mentioned in the episode:
https://www.backupwrapup.com/tape-drive-designer-schools-mr-backup-on-tape/
https://www.backupwrapup.com/red-team-cyber-security-strategies/
Pre-order Learning Ransomware Response & Recovery: https://www.amazon.com/Learning-Ransomware-Response-Recovery-Stopping/dp/1098169581

289 Listeners

374 Listeners

649 Listeners

201 Listeners

1,031 Listeners

322 Listeners

8,109 Listeners

177 Listeners

316 Listeners

71 Listeners

207 Listeners

138 Listeners

44 Listeners

168 Listeners

1,288 Listeners