âThese are key areas that we are focusing on and weâre trying to make headway as foundational to the overall cybersecurity and cyber imperative,â Jones said Wednesday at a Splunk-hosted cyber event.
She noted that IC works to investigate nation state-linked adversaries on a daily basis and cited security risks associated with open-source tools.
âHackers are successfully infecting a wide range of users through official software distribution channels and also obfuscating their intended targets,â Jones said.
Jones said the procurement of services and exploits by cyber threat actors from various vendors on the dark web is an example of the commoditization of hacking capabilities.