VIDEO
Holiday Horror Stories: Why Hackers Love Long Weekends
Video Summary:
Why do so many major cyberattacks happen over holiday weekends? In this episode, Sherri and Matt share their own 4th of July anxiety as security professionals—and walk through some of the most infamous attacks timed to exploit long weekends, including the Kaseya ransomware outbreak, the MOVEit breach, and the Bangladesh Bank heist. From retail breaches around Thanksgiving to a cyber hit on Krispy Kreme, they break down what makes holidays such a juicy target—and how to better defend your organization when most of your team is off the clock. Takeaways: 1. Treat Holiday Weekends as Elevated Threat Windows. Plan and staff accordingly. Threat actors deliberately strike when visibility and response capacity are lowest—your incident response posture should reflect that heightened risk. 2. Establish and Test Off-Hours Response Plans. Ensure escalation paths, contact protocols, and technical procedures are defined, reachable, and tested for weekends and holidays. On-call responsibilities should be clearly assigned with appropriate backups. 3. Reduce Your Attack Surface and Harden Perimeter Before the Break. Conduct targeted patching, vulnerability scans, and privilege reviews in the days leading up to any holiday period. Temporarily disable or restrict non-essential access and remote administration rights. 4. Practice Incident Response Tabletop Exercises With Holiday Timing in Mind. Simulate scenarios that unfold over weekends or during staff absences to uncover timing-based gaps in coverage, decision-making, or escalation. Make sure playbooks account for limited availability and stress-test your team’s ability to respond under real-world holiday constraints. 5. Communicate Expectations Across the Organization and With 3rd Parties Brief relevant teams (not just security) on the increased risk. Reinforce secure behaviors, clarify how to report suspicious activity, and keep business units informed about potential delays or escalation protocols. Talk with your MSP and other 3rd party vendors to ensure they have consistent monitoring and know who to contact if there is an incident (and vice versa). Resources: • MOVEit Data Breach Timeline – Rapid7: https://www.rapid7.com/blog/post/2023/06/14/etr-cve-2023-34362-moveit-vulnerability-timeline-of-events/ • Kaseya Ransomware Attack Explained – Varonis: https://www.varonis.com/blog/revil-msp-supply-chain-attack • Bangladesh Bank Heist – Darknet Diaries Episode 72: https://darknetdiaries.com/transcript/72/ • Tabletop Exercises & Incident Response Planning – LMG Security: https://www.lmgsecurity.com/services/training/tabletop-exercises/ #cybersecurity #dfir #incidentresponse #ciso #cybersidechats #cybersecurityleadership #infosec #itsecurity #cyberaware
Why do so many major cyberattacks happen over holiday weekends? In this episode, Sherri and Matt share their own 4th of July anxiety as security professionals—and walk through some of the most infamous attacks timed to exploit long weekends, including the Kaseya ransomware outbreak, the MOVEit breach, and the Bangladesh Bank heist. From retail breaches around Thanksgiving to a cyber hit on Krispy Kreme, they break down what makes holidays such a juicy target—and how to better defend your organization when most of your team is off the clock. Takeaways: 1. Treat Holiday Weekends as Elevated Threat Windows. Plan and staff accordingly. Threat actors deliberately strike when visibility and response capacity are lowest—your incident response posture should reflect that heightened risk. 2. Establish and Test Off-Hours Response Plans. Ensure escalation paths, contact protocols, and technical procedures are defined, reachable, and tested for weekends and holidays. On-call responsibilities should be clearly assigned with appropriate backups. 3. Reduce Your Attack Surface and Harden Perimeter Before the Break. Conduct targeted patching, vulnerability scans, and privilege reviews in the days leading up to any holiday period. Temporarily disable or restrict non-essential access and remote administration rights. 4. Practice Incident Response Tabletop Exercises With Holiday Timing in Mind. Simulate scenarios that unfold over weekends or during staff absences to uncover timing-based gaps in coverage, decision-making, or escalation. Make sure playbooks account for limited availability and stress-test your team’s ability to respond under real-world holiday constraints. 5. Communicate Expectations Across the Organization and With 3rd Parties Brief relevant teams (not just security) on the increased risk. Reinforce secure behaviors, clarify how to report suspicious activity, and keep business units informed about potential delays or escalation protocols. Talk with your MSP and other 3rd party vendors to ensure they have consistent monitoring and know who to contact if there is an incident (and vice versa). Resources: • MOVEit Data Breach Timeline – Rapid7: https://www.rapid7.com/blog/post/2023/06/14/etr-cve-2023-34362-moveit-vulnerability-timeline-of-events/ • Kaseya Ransomware Attack Explained – Varonis: https://www.varonis.com/blog/revil-msp-supply-chain-attack • Bangladesh Bank Heist – Darknet Diaries Episode 72: https://darknetdiaries.com/transcript/72/ • Tabletop Exercises & Incident Response Planning – LMG Security: https://www.lmgsecurity.com/services/training/tabletop-exercises/ #cybersecurity #dfir #incidentresponse #ciso #cybersidechats #cybersecurityleadership #infosec #itsecurity #cyberaware