
Sign up to save your podcasts
Or


Privilege escalation attacks represent one of the most dangerous cybersecurity threats facing organizations today. In this episode of The Backup Wrap-Up, we analyze how threat actors use initial access to gain higher privileges and compromise entire networks. Through examples from Mr. Robot, we explore both vertical privilege escalation (exploiting vulnerabilities for admin access) and horizontal attacks (spreading through shared systems). Learn why backup administrators often become prime targets for privilege escalation and how proper security controls can prevent these attacks. We discuss real-world cases including the Target breach via HVAC systems and recent ransomware campaigns using social engineering for privilege escalation. Discover how IoT devices create attack vectors, why physical security remains crucial, and how immutable backups protect against privilege escalation attempts. Perfect for IT professionals seeking to understand and defend against these sophisticated attack methods.
Mentioned in the episode:
https://www.backupwrapup.com/tape-drive-designer-schools-mr-backup-on-tape/
https://www.backupwrapup.com/red-team-cyber-security-strategies/
Pre-order Learning Ransomware Response & Recovery: https://www.amazon.com/Learning-Ransomware-Response-Recovery-Stopping/dp/1098169581
By W. Curtis Preston (Mr. Backup)4.7
2525 ratings
Privilege escalation attacks represent one of the most dangerous cybersecurity threats facing organizations today. In this episode of The Backup Wrap-Up, we analyze how threat actors use initial access to gain higher privileges and compromise entire networks. Through examples from Mr. Robot, we explore both vertical privilege escalation (exploiting vulnerabilities for admin access) and horizontal attacks (spreading through shared systems). Learn why backup administrators often become prime targets for privilege escalation and how proper security controls can prevent these attacks. We discuss real-world cases including the Target breach via HVAC systems and recent ransomware campaigns using social engineering for privilege escalation. Discover how IoT devices create attack vectors, why physical security remains crucial, and how immutable backups protect against privilege escalation attempts. Perfect for IT professionals seeking to understand and defend against these sophisticated attack methods.
Mentioned in the episode:
https://www.backupwrapup.com/tape-drive-designer-schools-mr-backup-on-tape/
https://www.backupwrapup.com/red-team-cyber-security-strategies/
Pre-order Learning Ransomware Response & Recovery: https://www.amazon.com/Learning-Ransomware-Response-Recovery-Stopping/dp/1098169581

32,090 Listeners

291 Listeners

2,002 Listeners

625 Listeners

375 Listeners

637 Listeners

1,016 Listeners

112,467 Listeners

175 Listeners

314 Listeners

73 Listeners

134 Listeners

5,470 Listeners

16,072 Listeners

44 Listeners