Reindeer Recon: Reconnaissance and Pre-Holiday Scanning

Executive Summary

As organisations wind down for the festive break, cyber adversaries ramp up their reconnaissance efforts. This early phase of the cyber kill chain (reconnaissance) involves scanning, mapping and profiling networks to identify potential weaknesses for later exploitation. During December, when IT teams are distracted by change freezes and reduced staffing, attackers quietly gather information on exposed services, outdated software and vulnerable systems. Executives should treat reconnaissance not as a low-level nuisance, but as the first warning bell of potential compromise.

How the Attack Works

Reconnaissance attacks involve external scanning and information gathering. Attackers use automated tools to probe networks for open ports, misconfigured firewalls and unpatched software. They also perform passive reconnaissance, collecting publicly available data from corporate websites, social media or job postings that may reveal system types, vendors or technologies in use.

Once attackers identify a target, they catalogue vulnerabilities and create a plan for initial access. This may include targeting unpatched web servers, remote desktop services or outdated VPN appliances. The process is largely invisible to end users and can persist for weeks before active exploitation begins.

During the Christmas season, reconnaissance often precedes major attacks in January, when attackers assume systems are least monitored and incident response capacity is lowest.

Australian Context / Case Study

The ACSC’s Cyber Threat Report 2024-2025 noted that reconnaissance as the most common activity type leading to critical infrastructure-related incidents at 41 per cent. During FY2024–25, ASD’s ACSC notified entities more than 1,700 times of potentially malicious cyber activity, an 83% increase from the previous year, highlighting the ongoing need for vigilance and action to mitigate against persistent threats. State-sponsored cyber actors continue to pose a serious and growing threat to our nation. ASD observed that threat actors commonly scan for vulnerabilities throughout an analysis period before exploiting the discovered vulnerability at a time when the attacker believes the target is least equipped to detect and respond to an attack.

How the Essential Eight Mitigates the Risk

While reconnaissance itself is difficult to prevent, the Essential Eight reduces its effectiveness and limits what attackers can discover:

  • Patch Applications and Operating Systems: Removes known vulnerabilities that attackers seek during scanning, preventing exploitation of outdated systems.
  • Restrict Administrative Privileges: Prevents lateral movement if reconnaissance identifies weak internal controls.
  • Application Control: Blocks execution of malicious scanning or enumeration tools on internal systems.
  • Multi-Factor Authentication (MFA): Ensures compromised credentials from reconnaissance do not result in unauthorised access.
  • User Application Hardening: Reduces attack surface by disabling unnecessary features or exposed services.
  • Regular Backups: Allows recovery if reconnaissance leads to a successful compromise and ransomware deployment.
  • Configure Microsoft Office Macro Settings: Reduces phishing vectors that may accompany reconnaissance-driven targeting.

Together, these controls ensure that even if attackers gather some intelligence, exploiting it becomes significantly more difficult and resource-intensive.

Executive Takeaways

  1. Conduct an external vulnerability scan before the Christmas break to identify and patch exposed systems.
  2. Review firewall and VPN configurations, closing unused or outdated services.
  3. Implement continuous monitoring and alerting for unusual scanning activity.
  4. Enforce MFA and strong password policies for all remote access systems.
  5. Require staff to update all endpoints with up to date software and patches before the holiday period.
  6. Develop an on-call plan for responding to detected reconnaissance or intrusion attempts over the holidays.

By maintaining vigilance and aligning with the Essential Eight, organisations can ensure their networks remain resilient, allowing executives to enjoy the holidays knowing that the only reindeer exploring their environment are the ones in festive stories, not in their firewalls.