CyberWire Daily: "Walking Through the Anatomy of a Cyberattack"
Date: April 12, 2026
Host: N2K Networks
Guest: John Anthony Smith, Founder & Chief Security Officer, Phoenix 24
Episode Overview
In this episode, CyberWire-X guides listeners step-by-step through the anatomy of a modern cyberattack—examining how attackers infiltrate environments, exploit weaknesses, escalate privileges, and ultimately achieve their objectives. Guest expert John Anthony Smith draws on over 16 years of breach response to illuminate not only the tradecraft and tools used by threat actors, but also the critical moments defenders often miss and actionable steps to strengthen detection, readiness, and recovery.
Key Discussion Points & Insights
1. The Modern Cyberattack: Entry and Escalation
- Initial Access Techniques: Threat actors exploit vulnerabilities in widely-used VPN and firewall products, notably SonicWall and Fortinet (Akira group), and Cisco AnyConnect (Scattered Spider).
- Credential Attacks:
- Abuse of self-service password reset features, often enabled by default for privileged accounts (Office 365, [06:20]).
- Social engineering through help desks, obtaining password or MFA resets for accounts (non-privileged and privileged).
Quote:
"Microsoft has so graciously turns on self service password reset for administrator accounts, privileged accounts by default in Office 365. So you don’t actually have to do anything for that weakness to be enabled in your tenancy. Microsoft has so graciously done that for you and Scattered Spider abuses it." — John Anthony Smith [06:32]
2. Persistence and Lateral Movement
- Gaining Persistence: Attackers maintain presence via legitimate remote access tools such as TeamViewer, AnyDesk, and RMM (Remote Monitoring & Management) platforms ([11:46]).
- Privilege Escalation & Lateral Movement:
- Attackers may harvest privileged credentials by exploiting help desks, examining documentation, or extracting credentials from scripts on domain shares ([14:31]).
- Once in, lack of network segmentation and admin identity management accelerates lateral movement.
Quote:
"Privileged creds should under no circumstance be permitted to log into remote access platforms. But honestly, basically all organizations are allowing this, and that is commonly what threat actors abuse to gain persistent access." — John Anthony Smith [10:25]
3. Backup Destruction and Survivability
- Backups Are Not Always Survivable:
- Many organizations overestimate their backup robustness; attackers can often destroy them via compromised credentials or by targeting backup systems joined to the domain ([02:49], [22:46]).
- True immutability means there's absolutely no administrative override for deletion—only a time-based lock should allow changes ([22:46]).
Quote:
"Our statistic actually measures could the threat actor have technically destroyed the backups in the way that they were actually orchestrated. Our statistics states that 84% of organizations do not have a survivable recovery facility." — John Anthony Smith [02:49]
- Best Practices:
- Backups must be segmented by storage location and identity (i.e., not all copies reachable by one set of credentials).
- Employ multiple immutability algorithms and distinct storage environments.
Quote:
"What we know from breach is that survivability is truly a factor of the number of backup copies kept, the locations that you actually keep them, meaning they have to be segmented. And thirdly, that the number of identity planes that you store those copies in, meaning they can’t be all collapsed into the same identity plane…" — John Anthony Smith [24:12]
4. Detection and Prevention Gaps
- Alert Fatigue & Missed Opportunities: Organizations often lack sufficient monitoring for exfiltration and data loss.
- Monitoring Over Blocking:
- High-volume data exfiltration, e.g., the Stryker breach (Handala group), can go undetected without alert thresholds for unusual outbound transfers ([20:57]).
- "It is easier to monitor than prevent. To actually prevent it requires extensive tooling and frankly, extensive inconvenience..." [21:40]
5. Industry Mindset and Organizational Priorities
- Over-emphasis on Prevention, Under-investment in Recovery:
- $200 billion spent on prevention vs. just $20 billion on recovery in cybersecurity.
- Organizations wrongly assume backups will survive and prioritize user convenience over recovery resilience ([26:47]).
- Role of IT Convenience:
- Security controls often inconvenience end users but do little to inconvenience IT staff, inadvertently making environments easier for attackers to exploit IT access ([11:59]).
Quote:
"IT professionals commonly focus their security efforts on inconveniencing the user rather than inconveniencing themselves… The goal here has to be to frustrate the attacker… and until IT professionals are able and willing to complicate their own access to systems, these breaches are going to continue happening at the scale and quantity that they are." — John Anthony Smith [11:59]
Notable Quotes & Memorable Moments
-
On Backup Failures:
"58% of organizations who find themselves in a significant event, cyber event, discover a partial or full failure of their backup and recovery capabilities during the event itself." [02:49]
-
On True Immutability:
"If what you mean by immutability is that one person request a configuration change and another approves it, that is not true immutability." [24:41]
-
On Lateral Movement Ease:
"If all they have to do is get on the VPN or if all they have to do is get a user…to allow a remote session…to then open VCenter…then the leap to destruction is quite easy. The lateral movement is quite easy." [17:36]
-
On IT Culture:
"If it’s easy for an IT administrator to do, it’s easy for a threat actor to do." [32:43]
Timestamps for Important Segments
- [01:34] — John Anthony Smith’s professional origins and the event that shifted his career focus.
- [02:49] — Statistics on backup failures and what "survivable recovery" really means.
- [04:01] — Breakdown of current high-profile threat groups (Handala, Scattered Spider, Akira).
- [06:20] — Exploitation of self-service password resets and the vulnerabilities of help desk processes.
- [10:06] — Attack persistence and flaws in privileged access management.
- [14:31] — Methods of privilege escalation and lateral movement: help desk abuse, token and credential harvesting, and poor identity segmentation.
- [20:57] — Data exfiltration tactics and missed detection opportunities.
- [22:46] — Misconceptions around backup immutability and destruction by attackers.
- [26:47] — The industry’s prevention vs. recovery imbalance and why backup controls fail.
- [30:49] — Practical, prioritized advice for improving cyber resilience.
Practical Takeaways & Proactive Recommendations
-
Assess Recoverability Honestly:
- Conduct thorough, adversary-informed assessments of your real-world backup and recovery capabilities—not just tabletop assumptions.
- Practice actual recovery exercises, not just theoretical ones.
-
Complicate IT/Admin Access:
- Prioritize controls that frustrate and slow down attackers—even if it means IT staff have to endure more complex processes.
- Never allow privileged credentials to access remote access or critical infrastructure platforms.
-
Backup Resilience:
- Employ multiple, segmented, and independently managed backup copies.
- Use more than one immutability mechanism; do not trust vendor labels blindly.
- Ensure backup systems are not co-joined to the production network/domain.
- Delegate recovery orchestration to professionals if possible.
-
Monitor for Exfiltration:
- Set threshold-based alerts for large outbound data transfers.
- Treat monitoring for exfiltration as an essential, attainable first step.
-
Mature Identity Segmentation:
- Harden access to critical consoles and segment administrative identity from production directories.
- Do not store all privileged credentials in systems linked to production Active Directory.
Final Thoughts
John Anthony Smith emphasizes that while there are myriad opportunities to disrupt attackers, organizations must shift from a prevention-centric mindset to one of resilience and recovery—by investing in real-world recoverability, complicating IT access, and ensuring defense strategies are always informed by current adversary TTPs.
"Complication of admin identity and IT access to systems must be at the forefront and or equal, if you will, to backup survivability and timely recoverability. I think all three of those things have to be done in concert together with excellence." — John Anthony Smith [33:23]
Guest: John Anthony Smith, Founder & Chief Security Officer, Phoenix 24
Host: N2K Networks
For more information, visit Phoenix24 or CyberWire's website.