The Attack Vectors Have Changed
Protect yourself from
Compromised network devices
Attackers now reach z/OS through compromised trusted network devices — Windows servers, Linux hosts, VPN appliances, and other infrastructure your organization may not even own.
Insider Attacks
Stolen credentials give adversaries the same access as legitimate users, rendering traditional perimeter security ineffective against the most common attack vector.
Ransomware
Specialized ransomware-as-a-service operations, often state-sponsored, custom-build attack software targeting specific organizations. AI-powered tooling allows thousands of attacks to be launched simultaneously, each tailored to its target.
Gaps in existing security tools
Traditional security tools like RACF, ACF2, and Top Secret build strong walls. But when attackers walk through the front door with valid credentials, those walls cannot help. A typical mainframe site has two to four security staff, often part-time.
Attacks Are Easier Than You Think
From real-world penetration testing:
- Privilege escalation (becoming RACF SPECIAL) requires only 6 assembler instructions
- User impersonation (acting as another user) requires only 7 instructions
- AI assistance: ChatGPT generated working mainframe hardware encryption assembler code
- Tools freely available: Pen testing tools on GitHub can be used by attackers
You don't need 40 years of mainframe experience to attack a mainframe. Early Warning levels the playing field.
The IBMUSER Attack Vector
Every z/OS system has IBMUSER — a high-powered default account. Most sites disable it, but it often remains available in a revoked state. Attackers who gain RACF SPECIAL can:
- Resume the IBMUSER account
- Set their own password
- Log on with superuser capabilities
Early Warning detects successful IBMUSER logons — which should never occur in production.
The Cost of Inaction
Ransomware as a Service (RaaS)
One-stop shopping for hackers deploying ransomware

Insider Threats
Your biggest threat has a parking spot
Insider attacks often use legitimate credentials, so how can you protect yourself? CSF has you covered with Early Warning, Supply Chain and FIM+.
