What We Do
How we do it
Resources
SECURITY ADVISORIES
Jul 26, 2021
PetitPotam NTLM Relay Attack
THE THREAT PetitPotam is a variant of NTLM Relay attacks discovered by security researcher Gilles Lionel. Proof of Concept code released last week [1] relies on the Encrypting File System Remote (EFSRPC) protocol to provoke a Windows host into performing an NTLM authentication request against an attacker-controlled server, exposing NTLM authentication details or authentication certificates.…
Read More
View all Advisories →
Company
ABOUT eSENTIRE
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
LATEST PRESS RELEASE
Jul 12, 2021
Tecala and eSentire Partner to Protect Enterprises across APAC from Business-Disrupting Cyber Attacks
Sydney, 12 July, 2021 - Tecala, Australia’s award-winning technology services and IT consulting provider, today announced it has chosen eSentire, the global Authority in Managed Detection and Response (MDR) cybersecurity services, as their exclusive MDR solution provider in Australia and New Zealand. This partnership will enable Tecala to augment its cybersecurity practice and offer enterprises…
Read More
Partners
PARTNER PROGRAM
Partners
Our award-winning partner program offers financial rewards, sales and marketing tools and personalized training. Accelerate your business and grow your revenue by offering our world-class Managed Detection and Response (MDR) services.
Learn about our Partner Program
Resources
Blog — Jun 17, 2015

A swing and a miss for would-be baseball hackers

3 min read

The world recently learned that the much-revered St. Louis Cardinals hacked into an internal network managed by the Houston Astros to steal information about players and is now under investigation by the FBI and the US Justice Department. According to media coverage, the Cardinals hacked into special Astros databases housing information about upcoming player trades, proprietary statistics and scouting reports.

This marks the first instance of corporate cyber espionage in professional sports where one team hacked into a rival’s network. Most people have become accustomed to stories about breaches of company’s networks but we’re more familiar with the storyline where the perpetrators are located in foreign countries and are looking for money or other security data.

These Major League Baseball (MLB) criminals are local and yet the concept is somewhat foreign to us. The cult classic movie Moneyball made us aware of the value of baseball stats, but this real baseball drama where the reward was player intelligence and the cost an FBI investigation should make us all view cybersecurity in a new way.

This particular instance was not highly sophisticated; it was a case of stolen credentials, opportunity and a perceived valuable reward. With a few keystrokes the criminal has access to a competitive edge that seems almost too good to be true.

This is an example of a breach that could have been avoided. The victim at the root of this case made a cardinal (pardon the pun) error. He used simple passwords and failed to refresh them on a regular basis. This seems like a basic consideration when it comes to maintaining good cybersecurity hygiene, yet many people fail to follow this fundamental exercise. This is one reason why the types of sophisticated, targeted attacks that we see today are on the rise.

As all sectors, including professional sport, become more and more focused on harvesting, holding and leveraging data to be successful, protecting this data becomes even more critical. In all cases, proprietary data is extremely valuable and the threats are everywhere. What we’ve learned with this new story about professional baseball is that information has power and can entice someone to cross the line into criminal behaviour. Cybercrimes offer distance and anonymity, but make no mistake they are crimes and are taken seriously.

“The F.B.I. aggressively investigates all potential threats to public- and private sector systems,” an F.B.I. spokeswoman said. “Once our investigations are complete, we pursue all appropriate avenues to hold accountable those who pose a threat in cyberspace.” (New York Times)

The Houston Astros’ general manager Jeff Luhnow was quoted after the breach as saying that he was going back to using a pencil and paper. In today’s environment, there are tools available that are decidedly more high-tech and there’s no need to go back to old-school ways of saving information.

No one is immune to these types of crimes and we need to take measures to protect our valuable information, and as we evolve how we capture information we also must evolve how we protect it.

J. Paul Haynes
J. Paul Haynes President & Chief Operating Officer

J.Paul Haynes is a professional engineer with a 25-year entrepreneurial track record of success. J.Paul has led eSentire to 10x its size since he joined the company in late 2010.