
The Cybersecurity Dilemma: To Stop an Attack or to Study It?
Imagine a cybersecurity team discovers a backdoor into a company’s network. Worse, they see active hackers already inside, moving silently through the system. The standard playbook says to sound the alarm, shut down the access, and expel the intruders immediately. But what if there was another option? What if, instead of stopping the attack, you watched it?
This exact scenario has sparked a fierce debate within the information security community, splitting experts on a fundamental ethical question: is it better to immediately protect a single victim, or to covertly observe an attack to gather intelligence that could protect thousands?
This controversial practice, known as attacker surveillance, involves a security team monitoring active intruders within a compromised network to learn their methods, tools, and objectives. The debate pits the immediate duty to protect a compromised client against the potential for a greater good.
The Case for Surveillance: Gathering Priceless Threat Intelligence
Proponents of monitoring attackers argue that it provides an invaluable, real-world window into how cybercriminals operate. In a controlled environment, observing an attack unfold can yield critical insights that are impossible to gain from simulations or post-breach forensics alone.
The key benefits include:
- Understanding Attacker TTPs: Security teams can watch the Tactics, Techniques, and Procedures (TTPs) of an attacker in real-time. This includes seeing which tools they use, how they escalate privileges, and how they move laterally across a network.
- Developing Better Defenses: This intelligence can be used to build more robust and effective security measures. By understanding exactly how an attacker bypasses existing defenses, companies can fortify those weak points across the board.
- Broader Community Protection: The intelligence gathered is rarely kept secret. It is often anonymized and shared with the wider security community, helping countless other organizations recognize and defend against similar attacks. It transforms a single breach into a learning opportunity for an entire industry.
From this perspective, the short-term risk to one organization is a calculated gamble, weighed against the long-term benefit of strengthening collective digital defenses.
The Counterargument: An Unacceptable Risk and Ethical Breach
On the other side of the debate, critics argue that any form of passive observation is a dangerous and unethical dereliction of duty. Their primary argument is rooted in the principle of “do no harm.”
The most significant risks are:
- Extreme Danger to the Victim: Allowing hackers to roam a network, even under surveillance, exposes the compromised organization to catastrophic risk. The attackers could deploy ransomware, steal sensitive customer data, or destroy critical infrastructure at any moment. An observation mission could quickly spiral out of control.
- The Illusion of Control: Believing you can perfectly monitor and contain a skilled attacker may be dangerously optimistic. A sophisticated threat actor could discover the surveillance or have capabilities the observing team isn’t aware of, leading to a much more severe breach than would have otherwise occurred.
- Legal and Ethical Liability: What happens if data is stolen while the security team is just watching? The legal and reputational fallout for both the victim and the security firm could be immense. Without explicit, informed consent from the compromised organization, such an operation exists in a profound ethical and legal gray area.
For these experts, the duty to protect the client is absolute. The moment an active intrusion is confirmed, the only responsible course of action is immediate containment and remediation.
Protecting Your Business in a Complex Threat Landscape
Regardless of where you stand on this complex ethical issue, the debate underscores a critical reality: your organization could become the battleground. The existence of such tactics means you cannot assume a vulnerability, once discovered, will be immediately fixed. Businesses must operate with a proactive and resilient security posture.
Here are actionable steps every organization should take:
- Implement a Proactive Vulnerability Management Program: Don’t wait for others to find your weaknesses. Regularly scan your systems for vulnerabilities and patch them immediately. Prioritize critical vulnerabilities that are known to be actively exploited.
- Develop a Robust Incident Response Plan: Your team must know exactly what to do the moment a breach is detected. This plan should include steps for containment, eradication, and recovery. Regularly test this plan with tabletop exercises to ensure everyone knows their role.
- Adopt an “Assume Breach” Mentality: Operate under the assumption that an attacker is already inside your network. This mindset encourages the implementation of security controls like network segmentation, the principle of least privilege, and continuous monitoring to limit an attacker’s ability to move laterally if they do get in.
- Ensure Clear Communication Channels: Establish clear lines of communication with your security providers, whether they are in-house or a third-party managed service. Understand the protocols for how they will handle a security incident and what their disclosure policies are.
The debate over attacker surveillance highlights the evolving and often murky ethics of modern cyber defense. There are no easy answers, but it forces a necessary conversation about risk, responsibility, and the strategies we employ to stay one step ahead of our adversaries.
Source: https://go.theregister.com/feed/www.theregister.com/2025/09/12/huntress_attacker_surveillance/


