Cybersecurity – INDIA NEWS http://www.indiavpn.org News Blog Fri, 05 Apr 2024 12:29:42 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 CISO Perspectives on Complying with Cybersecurity Regulations http://www.indiavpn.org/2024/04/05/ciso-perspectives-on-complying-with-cybersecurity-regulations/ http://www.indiavpn.org/2024/04/05/ciso-perspectives-on-complying-with-cybersecurity-regulations/#respond Fri, 05 Apr 2024 12:29:42 +0000 https://www.indiavpn.org/2024/04/05/ciso-perspectives-on-complying-with-cybersecurity-regulations/ [ad_1]

Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and the specificity of the security controls, policies, and activities they include.

For CISOs and their teams, that means compliance is a time-consuming, high-stakes process that demands strong organizational and communication skills on top of security expertise.

We tapped into the CISO brain trust to get their take on the best ways to approach data security and privacy compliance requirements. In this blog, they share strategies to reduce the pain of dealing with the compliance process, including risk management and stakeholder alignment.

Read on for recommendations for turning compliance from a “necessary evil” into a strategic tool that helps you evaluate cyber risk, gain budget and buy-in, and increase customer and shareholder confidence.

Which CISOs care most about compliance?

How CISOs view cybersecurity compliance can vary greatly, depending on their company size, geography, sector, data sensitivity, and program maturity level. For example, if you’re a publicly traded company in the United States, you’ll have no choice but to comply with multiple regulations, as well as maintain risk assessments and corrective action plans.

If you’re a government agency or sell to one, you’ll have specific compliance public sector requirements to meet. Banks, healthcare organizations, infrastructure, eCommerce companies, and other enterprises have industry-specific compliance rules to follow.

Security does not equal compliance.

Even if you don’t fall into one of these categories, there are many reasons you’ll need to demonstrate security best practices, such as seeking SOC certification or applying for cybersecurity insurance. For all organizations, broad cybersecurity compliance frameworks like NIST CSF and ISO provide models to follow and structures for communicating results.

That said, “security does not equal compliance” is a mantra often heard among CISOs. Certainly, just because you’re compliant, that doesn’t mean you’re secure. Highly mature cybersecurity organizations may consider compliance the bare minimum and go well beyond the required components to protect their organizations.

Compliance as a business enabler

While a CISO can recommend cybersecurity investments and practices to meet compliance requirements, they aren’t the ultimate decision-maker. Therefore, a key responsibility of a CISO is communicating the risk of non-compliance and working with other company leaders to decide which initiatives to prioritize. Risk, in this context, incorporates not just technical risk, but also business risk.

Steve Zalewski, former CISO of Levi Strauss, likes to use the “carrot and stick” metaphor. “Audit and compliance historically have been the stick that makes you have to do something,” he shares on the Defense-in-Depth podcast, “but making [you] do it doesn’t mean that the business is aligned to the value of doing it.” To avoid friction, he recommends showing people the business value of compliant cybersecurity. “There has to be a carrot component to make them feel like they have a choice in the matter,” he says.

Leadership must weigh the costs and benefits of ensuring compliance with the potential costs of non-compliance

Let’s say an organization isn’t fully meeting a security best practice for privilege management. While non-compliance could result in regulatory fines and shareholder lawsuits, the underlying security gaps could cause an even greater impact on the business, including downtime, ransomware payments, and revenue loss. Meeting compliance requirements, on the other hand, could deliver business value, such as faster sales, stronger partnerships, or lower cyber insurance rates.

As part of a comprehensive risk management program, boards and executive leadership must weigh the costs and benefits of ensuring compliance with the potential costs of non-compliance. In some cases, they may decide that a certain level of risk is acceptable and choose not to implement additional safeguards. In other cases, they may double down.

How CISOs use compliance frameworks to plan their cybersecurity roadmap

Some CISOs use compliance frameworks as a methodology for techniques and processes to incorporate in their cybersecurity program. Essentially, they inform program priorities and create a shopping list for must-have solutions that align with the program they’re trying to build.

On the Audience First podcast, Brian Haugli, former Fortune 500 CISO, sees a difference between being compliance-dependent and using compliance frameworks to guide informed risk management.

We can’t be black and white. We have to be able to make risk-based decisions, to say, ‘I will accept this risk because I can’t afford to close it right now. But I will do these things to mitigate risk to a low enough level that allows me to accept them.

CISOs need partners in compliance

CISOs aren’t in the compliance boat alone. They must build partnerships with legal teams, privacy officers, and audit or risk committees to understand changing compliance requirements and decide how to address them.

Sometimes these internal partners require security teams to implement stronger controls, but they can also put on the breaks. As one CISO of a fast-growing technology vendor told us, “Frankly, Legal outweighs me every day of the week. They tell me what I can and can’t do. I would love to be able to monitor everyone’s behavior, but privacy laws say I can’t do that.

Compliance teams do many things that security engineers and analysts don’t have the time or resources to do. They hold security accountable, double-checking that the controls are working as expected. They act as intermediaries between security teams, regulators, and auditors to demonstrate compliance, whether that means collecting evidence through manual security questionnaires or via technology integrations.

For example, for a public sector certification, security controls need to be monitored, logged, and retained for at least six months of data to evidence that they’ve done what they said they were going to do.

Tools and resources that support compliance

Risk registers are helpful in aligning all stakeholders by documenting all risks and organizing them by priority. With everyone looking at the same information, you can agree on appropriate actions. As part of a risk management program, policies, standards, and procedures are regularly reviewed, and any changes approved before implementation.

Using tools like GRC systems and continuous compliance monitoring, organizations can track ongoing security activities and report results. GRC systems can link to SIEMs to collect logs and vulnerability scanners that show checks were completed. “Instead of shuffling spreadsheets around, we’ve built various connectors that integrate with our GRC platform to evidence that we are in compliance,” explains the tech CISO. “They map across certifications in a single pane of glass, so when an auditor comes in, we show them a screen that says, ‘Here’s the evidence.‘”

In addition to tooling, many companies rely on third parties to conduct compliance assessments. They may perform an internal compliance audit before an external one to make sure there are no surprises if regulators come calling.

Comply once, Apply to many

Most organizations have numerous compliance bodies they must answer to, as well as cyber insurance providers, customers, and partners. While compliance can be a burden, the good news is that there are techniques to streamline the assessment process. “If you look across all the major compliance bodies, about 80% of the requirements are the same,” says the CISO of a SaaS provider. “You can align with a framework like NIST and apply the same practices across them all.

For example, Privileged Access Management (PAM) requirements like password management, Multi-Factor Authentication (MFA), and Role-Based Access Controls are common across compliance frameworks. You can dig into the specifics to see how PAM shows up in a variety of compliance requirements on Delinea.com.

Emerging compliance requirements

Compliance is a fluid space with requirements that evolve to address changing risk patterns and business conditions. CISOs are looking to compliance bodies for guidance on managing emerging cyber risks, such as Artificial Intelligence.

Moving forward, CISOs expect that ensuring compliance will become an even greater part of their job. As the industry faces ever-growing threats, compliance is a key part of a strategic and comprehensive approach to cybersecurity risk management.

For more on this topic, check out Delinea’s 401 Access Denied podcast episode: Securing Compliance: Expert Insights with Steven Ursillo

Need a step-by-step guide for planning your strategic journey to privileged access security?

Start with a free, customizable PAM Checklist.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
http://www.indiavpn.org/2024/04/05/ciso-perspectives-on-complying-with-cybersecurity-regulations/feed/ 0
Considerations for Operational Technology Cybersecurity http://www.indiavpn.org/2024/04/04/considerations-for-operational-technology-cybersecurity/ http://www.indiavpn.org/2024/04/04/considerations-for-operational-technology-cybersecurity/#respond Thu, 04 Apr 2024 12:00:01 +0000 https://www.indiavpn.org/2024/04/04/considerations-for-operational-technology-cybersecurity/ [ad_1]

Operational Technology

Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise’s physical devices, processes, and events. Unlike traditional Information Technology (IT) systems, OT systems directly impact the physical world. This unique characteristic of OT brings additional cybersecurity considerations not typically present in conventional IT security architectures.

The convergence of IT and OT

Historically, IT and Operational Technology (OT) have operated in separate silos, each with its own set of protocols, standards, and cybersecurity measures. However, these two domains are increasingly converging with the advent of the Industrial Internet of Things (IIoT). While beneficial in terms of increased efficiency and data-driven decision-making, this convergence also exposes OT systems to the same cyber threats that IT systems face.

Unique Cybersecurity Considerations for OT

Real-time requirements

Operational Technology systems often operate in real-time and cannot afford delays. A delay in an OT system could lead to significant operational issues or even safety hazards. Therefore, OT cybersecurity measures that introduce latency, such as multi-factor authentication, just-in-time access request workflows, and session activity monitoring, may not be suitable for OT environments.

Note that the impact of these features on system performance can vary based on the specific PAM solution and how it’s configured. Therefore, it’s crucial to thoroughly test any PAM solution in a real-time environment to ensure it meets performance requirements while still providing necessary security controls.

Legacy systems and connectivity

Many Operational Technology systems are still old in the tooth. They’re proprietary and customized to meet the needs of longevity and resilience under harsh conditions. Cybersecurity was not a high-priority consideration for legacy OT systems, so they lack resilience against contemporary OT cybersecurity threats, resulting in high risk.

They may lack basic security capabilities such as encryption, authentication, and Multi-Factor Authentication (MFA.) Modernizing these systems presents significant challenges in terms of cost, operational disruptions, and compatibility issues. People with knowledge and skills may not be available, making understanding the design and the code impossible.

With the increasing integration of these systems into IT networks and, occasionally, the internet, their susceptibility to cyber threats is amplified. While beneficial for operational efficiency, this connectivity inadvertently expands their attack surface, thereby escalating their vulnerability.

Some examples of unique security challenges include:

  • Outdated Hardware and Software: Obsolete hardware and software introduce significant security challenges due mainly to incompatibility with modern off-the-shelf security solutions and best practices. This exposes legacy OT systems to unauthorized surveillance, data breaches, ransomware attacks, and potential manipulation.
  • Lack of Encryption: Encryption is crucial for safeguarding sensitive data and communications. Nonetheless, older OT systems might not have the capability to support encryption, which exposes them to attacks that could jeopardize the confidentiality and integrity of data.
  • Insecure Communication Protocols: Legacy OT systems may use insecure communication protocols that attackers can exploit. For example, Modbus, a widely used communication protocol in legacy OT systems, does not include authentication or encryption, making it vulnerable to attacks.
  • Limited Ability to Implement Cybersecurity Controls: Traditional OT systems frequently have a restricted capacity to apply cybersecurity measures. For example, they might have been provided before the importance of cybersecurity was recognized and managed by OEMs, complicating their security.
  • Third-Party Remote Connections: Older OT systems might support remote connections from third parties to manage OT devices linked to an internal network. Intruders can target a network established by a vendor and exploit it to contaminate other devices.
  • Lack of Security Awareness: Operators and technicians who manage legacy OT systems may lack security awareness and training, making them vulnerable to social engineering attacks.
  • Embedded or Easy-to-Guess Credentials: Certain OT devices, such as those in the IoT category, might possess inherent or predictable passwords, along with other potential design shortcomings.
Operational Technology

Safety and reliability

In Operational Technology environments, the primary focus is maintaining the safety and reliability of the physical processes they control. This is a significant departure from traditional IT environments, where the focus is often on the confidentiality and integrity of data.

  • Safety: OT systems control physical processes that can have real-world consequences if they malfunction. For example, in a power plant, a failure in the control system could lead to a shutdown or even a catastrophic event. Therefore, ensuring the safety of these systems is paramount.
  • Reliability: OT systems must be available and function correctly to ensure the smooth operation of physical processes. Any downtime can lead to significant operational disruptions and financial losses.

In contrast, in OT environments, confidentiality (preventing unauthorized access to information) and integrity (ensuring that data remains accurate and unaltered) often take a backseat. While these elements are significant, they usually don’t hold as much weight as safety and reliability.

This order of priority can affect the implementation of cybersecurity measures. A cybersecurity action that safeguards data (boosting confidentiality and integrity) but jeopardizes the dependability of an OT system might not be deemed suitable. For instance, a security patch could rectify a known vulnerability (improving integrity), but you might consider it unsuitable if it results in system instability (undermining reliability).

While many cybersecurity best practices and frameworks focus on traditional IT environments, OT can also benefit. For example, OWASP Top 10 addresses web application cybersecurity concerns such as injection, broken authentication, sensitive data exposure, and security misconfigurations, which are common vulnerabilities that can also be found in OT environments. OWASP also has a separate list for the Internet of Things (IoT), which is often a significant component of OT environments.

Cybersecurity strategies in OT environments must be carefully designed to balance the need for safety and reliability with the need for data confidentiality and integrity

Thus, cybersecurity strategies in OT environments need to be carefully designed to balance the need for safety and reliability with the need for data confidentiality and integrity. This often requires a different approach than traditional IT security, focusing more on minimizing disruptions to physical processes. It’s a delicate balancing act that requires deep knowledge of operational processes and potential cyber threats.

Securing OT environments requires a different approach compared to traditional information technology security. It requires understanding OT systems’ unique characteristics and requirements, as well as designing cybersecurity measures that can protect them without compromising their operation.

As IT and OT continue to converge, the importance of OT cybersecurity will only increase. The use of encryption is crucial for safeguarding sensitive data and communications. Nonetheless, older OT systems might not have the capability to support encryption, which exposes them to attacks that could jeopardize the confidentiality and integrity of data.

What does cybersecurity like this cost? Not as much as you think. Get a quote for the easiest-to-use enterprise-grade PAM solution available both in the cloud and on-premise.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
http://www.indiavpn.org/2024/04/04/considerations-for-operational-technology-cybersecurity/feed/ 0
Crafting and Communicating Your Cybersecurity Strategy for Board Buy-In http://www.indiavpn.org/2024/03/19/crafting-and-communicating-your-cybersecurity-strategy-for-board-buy-in/ http://www.indiavpn.org/2024/03/19/crafting-and-communicating-your-cybersecurity-strategy-for-board-buy-in/#respond Tue, 19 Mar 2024 11:14:09 +0000 https://www.indiavpn.org/2024/03/19/crafting-and-communicating-your-cybersecurity-strategy-for-board-buy-in/ [ad_1]

Cybersecurity Strategy

In an era where digital transformation drives business across sectors, cybersecurity has transcended its traditional operational role to become a cornerstone of corporate strategy and risk management. This evolution demands a shift in how cybersecurity leaders—particularly Chief Information Security Officers (CISOs)—articulate the value and urgency of cybersecurity investments to their boards.

The Strategic Importance of Cybersecurity

Cybersecurity is no longer a backroom IT concern but a pivotal agenda item in boardroom discussions. The surge in cyber threats, coupled with their capacity to disrupt business operations, erode customer trust, and incur significant financial losses, underscores the strategic value of robust cybersecurity measures. Moreover, as companies increasingly integrate digital technologies into their core operations, the significance of cybersecurity in safeguarding corporate assets and reputation continues to rise.

The Current State of Cybersecurity in Corporate Governance

Despite its strategic importance, however, there remains a significant gap in most boardroom’s understanding and management of cybersecurity risks. This gap stems from several challenges: the intricate nature of cybersecurity, the swift evolution of cyber threats, and a widespread lack of specialized expertise among board members. For example, among major US corporations, 51% of Fortune 100 companies have at least one director with a background in information security, while this figure drops to only 17% for S&P 500 companies and further declines to just 9% for companies listed in the Russell 3000 Index, highlighting a significant variation in cybersecurity expertise at the board level across different sizes of businesses.

Are you ready to bridge the expertise gap in your cybersecurity strategy? ArmorPoint offers tailored executive insights that empower you to convey the critical importance of robust cybersecurity measures to your board with confidence. Explore their virtual Chief Information Security Officer (vCISO) services today.

The regulatory landscape adds another layer of complexity, increasing the liability for C-suite executives and board members who are now expected to have a grasp on cybersecurity’s impact on the organization. Recent legislative developments underscore the need for enhanced transparency and accountability in how companies manage their cyber risks:

  • SEC’s Cyber Disclosure Rules (2023): In July 2023, the SEC adopted new rules requiring companies to provide detailed disclosures about their cyber risk assessments and management strategies. This move aims to improve transparency for investors and other stakeholders by mandating a clearer depiction of how companies identify, evaluate, and address their cybersecurity vulnerabilities.
  • Cyber Incident Reporting for Critical Infrastructure Act (2022): Issued by the White House, this act, known as CIRCIA, mandates timely reporting of cyber incidents by entities within critical infrastructure sectors. It reflects the government’s commitment to strengthening the nation’s cybersecurity resilience by promoting quicker responses to cyber threats and fostering a collaborative environment for sharing information about cyber incidents.

These regulatory changes are part of a broader push by regulators and the government to ensure that companies like yours take cybersecurity seriously—not just as a technical issue, but as a critical component of the overall business strategy. By mandating more detailed disclosures and faster incident reporting, these initiatives aim to create a more informed and secure digital ecosystem for businesses and their stakeholders. For C-suite executives and board members, staying ahead of these regulations and integrating their requirements into your company’s cybersecurity strategy is now an indispensable part of the job, emphasizing the need for a strategic, informed approach to cybersecurity governance.

Understanding the Board’s Perspective

Effective communication with the board about cybersecurity necessitates a strategic shift in the conversation away from the granular technical details and towards the broader implications for the company’s strategic goals. Boards traditionally focus on financial performance, regulatory compliance, and risk management, areas deeply affected by cybersecurity incidents. Yet, the intricacy of cybersecurity can obscure its relevance to these priorities, making it challenging for board members to grasp its full strategic significance. By reframing technical cybersecurity issues into business-centric discussions, you highlight not just the financial and regulatory risks but also position a robust cybersecurity posture as a strategic asset that safeguards and elevates the company’s value.

The key lies in steering the board away from “wrong” questions that limit the scope of cybersecurity discussions to tactical or superficial levels. Such questions often include:

  • “How much cybersecurity is enough?”
  • “What tools do we need to buy?”
  • “Are we compliant with the latest cybersecurity regulations?”
  • “Can we guarantee we won’t be hacked?”
  • “How does our cybersecurity spending compare to our competitors?”

Instead, encouraging the board to ask strategic questions like, “What resources do we need to feel comfortable with our level of risk?” transforms the dialogue. This shift promotes a deeper understanding of cybersecurity’s role in supporting the organization’s overarching strategic objectives and managing risk effectively.

Addressing Your Board’s Key Cybersecurity Concerns

When briefing your board on cybersecurity, it’s crucial to focus on their key concerns and priorities within the cybersecurity domain. Some of these key concerns include:

Financial Impact of Cyber Incidents

Boards are particularly concerned about the financial impact of cyber incidents, which can include direct costs such as ransom payments and recovery expenses, as well as indirect costs like reputational damage and loss of customer trust. To address this concern, CISOs should present a clear analysis of potential financial risks associated with various cyber threats and demonstrate how strategic cybersecurity investments can mitigate these risks. This includes showing cost-benefit analyses of proposed cybersecurity measures and highlighting case studies where robust cybersecurity defenses have led to minimized financial impacts.

Regulatory Compliance and Legal Liabilities

With the increasing number of data protection regulations globally, boards are concerned about compliance and the legal liabilities of failing to protect sensitive customer and company data. CISOs need to outline the current regulatory landscape relevant to their organization and explain how the cybersecurity strategy aligns with compliance requirements. This discussion should include the potential legal and financial repercussions of non-compliance and how your company’s cybersecurity measures are designed to prevent such outcomes.

Protection of Intellectual Property and Sensitive Data

The theft or exposure of intellectual property and sensitive data can have long-term detrimental effects on a company’s competitive position and market value. Boards want assurance that these assets are adequately protected. CISOs should discuss the specific measures in place to safeguard intellectual property and sensitive information, including data encryption, access controls, and monitoring systems. Additionally, explaining the incident response plan in the event of a data breach can provide your board with confidence in your company’s preparedness to protect its most valuable assets.

Resilience to Advanced Persistent Threats (APTs)

Advanced Persistent Threats (APTs) represent sophisticated, targeted attacks that can evade detection for extended periods, posing significant risks to organizations. Boards are interested in understanding how the company is positioned to detect and respond to such threats. CISOs should explain the organization’s threat intelligence and monitoring capabilities, detailing how APTs are identified and neutralized. Discussing partnerships with external cybersecurity experts and agencies can also demonstrate a proactive and comprehensive approach to tackling these high-level threats.

Cloud Security and Third-party Risk Management

As companies increasingly adopt cloud services and rely on third-party vendors, boards are concerned about the associated security risks. CISOs must address how the organization manages cloud security and third-party risks, including the vetting process for vendors, the implementation of cloud security best practices, and the continuous monitoring of third-party services. Providing examples of contractual safeguards and collaborative security measures with vendors can help reassure your board of your company’s capability to manage these risks effectively.

Adoption of Artificial Intelligence (AI)

As Artificial Intelligence (AI) becomes integral to cybersecurity strategies, board members express concerns about its complexities and potential vulnerabilities. CISOs are tasked with clarifying how AI is deployed to strengthen security defenses, manage AI-specific risks, and ensure adherence to ethical standards and compliance regulations. Illustrating the proactive measures taken to monitor and mitigate AI-related threats, alongside examples of AI-driven success stories in detecting and neutralizing cyberattacks, can effectively convey the organization’s preparedness and strategic advantage in utilizing AI technology.

Leverage ArmorPoint’s vCISO expertise to directly address your board’s top cybersecurity concerns. Discover transformative insights and strategies that ensure your cybersecurity measures resonate at the highest level.

Six Tips to Prepare to Brief Your Boardroom

Effective communication with your board about cybersecurity involves more than presenting facts; it requires a strategic approach that aligns cybersecurity initiatives with their priorities. This means demonstrating the financial, operational, and reputational benefits of investing in cybersecurity, making the case for cybersecurity as an integral part of your company’s risk management strategy. By articulating the value of cybersecurity in terms that resonate with your board, CISOs can foster a more productive dialogue about how to best protect the organization.

Keep these six tips in mind as you prepare your presentation for your board.

Communicating the Need for the Cybersecurity Program to the Board:

1. Speak the Language of the Board:

  • Perform a Business Impact Analysis and translate technical cybersecurity risks into business terms that resonate with the board, such as financial impact, regulatory compliance, and reputational damage.

2. Quantify Risks and Impacts:

  • Use data and metrics from a risk assessment to quantify cybersecurity risks and the potential impacts on the organization.
  • Present cost-benefit analyses and return on investment (ROI) projections to demonstrate the value of investing in cybersecurity measures.

3. Align with Business Objectives:

  • Emphasize how the cybersecurity program aligns with the organization’s strategic objectives and contributes to long-term growth and sustainability.
  • Highlight the role of cybersecurity in enabling digital transformation, enhancing customer trust, and protecting brand reputation.

4. Provide Context and Benchmarks:

  • Provide context by comparing the organization’s cybersecurity posture with industry peers and benchmarks.
  • Highlight areas where the organization may be lagging behind or where investments are needed to meet industry standards and regulatory requirements.

5. Foster Ongoing Dialogue and Collaboration:

  • Foster an ongoing dialogue with the board about cybersecurity risks, trends, and mitigation strategies.
  • Solicit input and feedback from the board to ensure that cybersecurity initiatives are aligned with their risk tolerance level and strategic priorities.

6. Demonstrate Accountability and Compliance:

  • Emphasize the importance of cybersecurity as a corporate governance issue and demonstrate the organization’s commitment to accountability and compliance with regulatory requirements.
  • Provide regular updates to the board on cybersecurity initiatives, progress, and key performance indicators (KPIs).

Conclusion

As digital threats continue to evolve, the role of cybersecurity within corporate governance becomes increasingly critical. By effectively communicating the strategic importance of cybersecurity investments, cybersecurity leaders like you can ensure that your Board of Directors understands the vital role these measures play in safeguarding your company’s future. Through informed, strategic conversations, organizations can better navigate the complex landscape of cyber risks, aligning cybersecurity efforts with business objectives to achieve greater resilience and security.

For more information about how you can effectively communicate the value of cybersecurity to your board of directors, explore ArmorPoint’s vCISO services today.


Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
http://www.indiavpn.org/2024/03/19/crafting-and-communicating-your-cybersecurity-strategy-for-board-buy-in/feed/ 0
Demystifying a Common Cybersecurity Myth http://www.indiavpn.org/2024/03/13/demystifying-a-common-cybersecurity-myth/ http://www.indiavpn.org/2024/03/13/demystifying-a-common-cybersecurity-myth/#respond Wed, 13 Mar 2024 16:34:31 +0000 https://www.indiavpn.org/2024/03/13/demystifying-a-common-cybersecurity-myth/ [ad_1]

Mar 13, 2024The Hacker NewsApp Security / Cyber Security

Demystifying a Common Cybersecurity Myth

One of the most common misconceptions in file upload cybersecurity is that certain tools are “enough” on their own—this is simply not the case. In our latest whitepaper OPSWAT CEO and Founder, Benny Czarny, takes a comprehensive look at what it takes to prevent malware threats in today’s ever-evolving file upload security landscape, and a big part of that is understanding where the pitfalls are, and how to avoid them.

The first step in that process is understanding that three commonly used tools or solutions are not enough on their own. Let’s explore this concept and take a closer look at a better solution.

Understanding the Challenge

Modern web applications are complex, utilizing internet-connected IT systems that interface with critical OT systems, as well as leveraging a wide range of cloud providers and protocols. All these systems transfer and store highly sensitive and valuable data across government, healthcare, power, financial, and other critical sectors the world over, carrying with them threats capable of causing severe damage.

Securing file uploads to detect and prevent malware infiltration is critical. As this threat vector grows and the attack surface spreads, ensuring that these sectors remain secure becomes of the utmost importance. This is why building—and enforcing—a reliable and proven security strategy is paramount moving forward.

Tools of the Trade

One tool on its own is simply not enough. Here are three commonly used tools that, when used on their own to secure file uploads, do not offer adequate protection and why that is the case:

1. Anti-Malware File Scanning

Everyone is familiar with anti-malware, but not all anti-malware engines—or scanning modes—are created equal. It’s intriguing that there is still so much confusion over the efficacy rates when it comes to the “always-on” real-time protection that’s monitoring an entire system versus, say, static file scanning strategies that need to be run manually or scheduled. Real-time scanning can exhibit nearly 100% efficacy rates, while in contrast, static scanning is noticeably lower with rates that range between 6-76%. To avoid a false sense of security, organizations must know exactly what they are getting with each deployment mode.

2. Web Application Firewalls

Many experts believe that by installing a web application firewall (WAF) they are protected against malicious file uploads. The reality is that it is very much not the case, as web application firewalls primarily protect against attacks at the application layer (OSI Layer 7). They do not have a specific design to prevent malware infections that may target other layers or spread through different channels, such as email attachments or removable media. Additionally, they struggle with encrypted traffic (like https) and typically rely on a single anti-malware solution for threat detection.

3. Sandboxing

Sandboxing is a technique that was originally used to analyze malware by isolating and executing suspicious files in a controlled environment to understand their behavior and detect potential signs of malware. Alone, sandboxes face limitations such as weakness to advanced and time-based evasion techniques that obfuscate or delay malicious activities and environment-specific triggers in adaptive malware. They are resource-intensive, prone to false positives and negatives, and offer limited coverage specific to file-based malware.

Defense-in-Depth Cybersecurity

So, if you can’t rely on these methods alone, what is the answer? This is one of the spaces OPSWAT has spent the last 20 years innovating in. Our MetaDefender Platform layers in market-leading and globally trusted technologies to form an easy to deploy, integrated-by-design, defense-in-depth cybersecurity strategy for securing file uploads.

Multiscanning: Utilize over 30 of the world’s best antivirus engines to detect nearly 100% of threats

Multiscanning

As the effectiveness of single anti-malware solutions for static analysis varies anywhere from 6% to 76%, we decided to integrate multiple commercially available ones into our solution and benefit from their combined power. With more than 30 leading anti-malware engines working simultaneously, our efficacy rates are just shy of 100% while being optimized for speed.

Deep Content Disarm and Reconstruction: Sanitize, block, and remove file objects and regenerate a safe copy

Deep Content Disarm and Reconstruction (Deep CDR)

To further bolster our defenses, we pioneered a unique methodology, referred to as Deep Content Disarm and Reconstruction (Deep CDR). Awarded a AAA, 100% Protection rating from SE Labs, our unique technology provides comprehensive prevention-based security for file uploads by neutralizing potential threats before they can cause harm. It evaluates and verifies the file type and consistency and validates file extensions to prevent masquerading and alerts organizations if they are under attack. Then it separates files into discrete components and removes potentially harmful objects and rebuilds usable files, reconstructing metadata, preserving all file characteristics.

Proactive Data Loss Prevention: Reduce alert fatigue by redacting sensitive data

Proactive Data Loss Prevention (Proactive DLP)

OPSWAT’s Proactive Data Loss Prevention (DLP) module was developed specifically to address the growing concerns of compliance and regulation, data leakage and risks associated with file uploads. Our solution detects and protects sensitive information within various file types, including text, image, and video-based patterns.

Adaptive Sandbox: Adaptive threat analysis technology enables zero-day malware detection and extracts more indicators of compromise.

Real-Time Adaptive Sandbox

To overcome the limitations of traditional sandboxing, OPSWAT developed a unique emulation-based sandbox with adaptive threat analysis. By pairing it with our Multiscanning and Deep CDR technologies it provides a comprehensive multi-layered approach to malware detection and prevention. Our emulation-based approach can swiftly de-obfuscate and dissect even the most complex, state-of-the-art, and environment-aware malware in under 15 seconds.

What’s Next?

These are only some of the technologies that power the MetaDefender Platform. Like the modules detailed in this article, there are more that are purpose-built to meet the varied use-cases and needs of critical infrastructure protection. Like the threat landscape around us, we are driving innovation forward to step up and stay ahead of the latest threats.

We encourage you to read the whole whitepaper here, and when you’re ready to discover why OPSWAT is the critical advantage in file upload cybersecurity, talk to one of our experts for a free demo.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
http://www.indiavpn.org/2024/03/13/demystifying-a-common-cybersecurity-myth/feed/ 0
Cybersecurity Agencies Warn Ubiquiti EdgeRouter Users of APT28’s MooBot Threat http://www.indiavpn.org/2024/02/28/cybersecurity-agencies-warn-ubiquiti-edgerouter-users-of-apt28s-moobot-threat/ http://www.indiavpn.org/2024/02/28/cybersecurity-agencies-warn-ubiquiti-edgerouter-users-of-apt28s-moobot-threat/#respond Wed, 28 Feb 2024 07:16:13 +0000 https://www.indiavpn.org/2024/02/28/cybersecurity-agencies-warn-ubiquiti-edgerouter-users-of-apt28s-moobot-threat/ [ad_1]

Feb 28, 2024NewsroomFirmware Security / Vulnerability

MooBot Threat

In a new joint advisory, cybersecurity and intelligence agencies from the U.S. and other countries are urging users of Ubiquiti EdgeRouter to take protective measures, weeks after a botnet comprising infected routers was felled by law enforcement as part of an operation codenamed Dying Ember.

The botnet, named MooBot, is said to have been used by a Russia-linked threat actor known as APT28 to facilitate covert cyber operations and drop custom malware for follow-on exploitation. APT28, affiliated with Russia’s Main Directorate of the General Staff (GRU), is known to be active since at least 2007.

APT28 actors have “used compromised EdgeRouters globally to harvest credentials, collect NTLMv2 digests, proxy network traffic, and host spear-phishing landing pages and custom tools,” the authorities said [PDF].

The adversary’s use of EdgeRouters dates back to 2022, with the attacks targeting aerospace and defense, education, energy and utilities, governments, hospitality, manufacturing, oil and gas, retail, technology, and transportation sectors in the Czech Republic, Italy, Lithuania, Jordan, Montenegro, Poland, Slovakia, Turkey, Ukraine, the U.A.E., and the U.S.

Cybersecurity

MooBot attacks entail targeting routers with default or weak credentials to deploy OpenSSH trojans, with APT28 acquiring this access to deliver bash script and other ELF binaries to collect credentials, proxy network traffic, host phishing pages, and other tooling.

This includes Python scripts to upload account credentials belonging to specifically targeted webmail users, which are collected via cross-site scripting and browser-in-the-browser (BitB) spear-phishing campaigns.

APT28 has also been linked to the exploitation of CVE-2023-23397 (CVSS score: 9.8), a now-patched critical privilege escalation flaw in Microsoft Outlook that could enable the theft of NT LAN Manager (NTLM) hashes and mount a relay attack without requiring any user interaction.

Another tool in its malware arsenal is MASEPIE, a Python backdoor capable of executing arbitrary commands on victim machines utilizing compromised Ubiquiti EdgeRouters as command-and-control (C2) infrastructure.

“With root access to compromised Ubiquiti EdgeRouters, APT28 actors have unfettered access to Linux-based operating systems to install tooling and to obfuscate their identity while conducting malicious campaigns,” the agencies noted.

Cybersecurity

Organizations are recommended to perform a hardware factory reset of the routers to flush file systems of malicious files, upgrade to the latest firmware version, change default credentials, and implement firewall rules to prevent exposure of remote management services.

The revelations are a sign that nation-state hackers are increasingly using routers as a launchpad for attacks, using them to create botnets such as VPNFilter, Cyclops Blink, and KV-botnet and conduct their malicious activities.

The bulletin arrives a day after the Five Eyes nations called out APT29 – the threat group affiliated with Russia’s Foreign Intelligence Service (SVR) and the entity behind the attacks on SolarWinds, Microsoft, and HPE – for employing service accounts and dormant accounts to access cloud environments at target organizations.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
http://www.indiavpn.org/2024/02/28/cybersecurity-agencies-warn-ubiquiti-edgerouter-users-of-apt28s-moobot-threat/feed/ 0
Cybersecurity for Healthcare—Diagnosing the Threat Landscape and Prescribing Solutions for Recovery http://www.indiavpn.org/2024/02/21/cybersecurity-for-healthcare-diagnosing-the-threat-landscape-and-prescribing-solutions-for-recovery/ http://www.indiavpn.org/2024/02/21/cybersecurity-for-healthcare-diagnosing-the-threat-landscape-and-prescribing-solutions-for-recovery/#respond Wed, 21 Feb 2024 10:58:11 +0000 https://www.indiavpn.org/2024/02/21/cybersecurity-for-healthcare-diagnosing-the-threat-landscape-and-prescribing-solutions-for-recovery/ [ad_1]

Cybersecurity for Healthcare

On Thanksgiving Day 2023, while many Americans were celebrating, hospitals across the U.S. were doing quite the opposite. Systems were failing. Ambulances were diverted. Care was impaired. Hospitals in three states were hit by a ransomware attack, and in that moment, the real-world repercussions came to light—it wasn’t just computer networks that were brought to a halt, but actual patient care itself.

Cybercriminals are more brazen than ever, targeting smaller healthcare organizations for big payouts. Sure, it would be nice to believe thieves once lived by a code of conduct, but if one ever existed, it’s been torn to shreds and tossed into the wind. Sophisticated hacker groups are now more than happy to launch cyberattacks on medical clinics, nursing homes, and other health service providers. Small- to mid-sized healthcare organizations have, unfortunately, become vulnerable targets from which cybercriminals can easily steal sensitive data, extort heavy ransoms, and, worst of all, diminish critical patient care.

Ransomware and Phishing Attacks are Spreading at an Unhealthy Rate

If you work in healthcare, everything you do is important. That’s why the frequency by which healthcare organizations now come under attack is so concerning. According to the U.S. Department of Health and Human Services (HHS), there’s been a 93% increase in large breaches from 2018 to 2022. In that same period, there’s been a 278% increase in breaches involving ransomware.

Ransomware doesn’t just hold your pocketbook hostage, but also your patients’ safety. At best, you’re locked out of your systems for a moment. At worst, patient care is radically compromised. This is especially alarming if you service smaller communities, where the local population relies on your clinic, cancer center, or physician’s office as the first and last lines of critical care.

Your patients are obviously your top priority, but you also have to consider the dollars at stake. The HIPAA Journal notes that in 2021, the average ransomware payment in the healthcare industry was $197,000. And that’s an increase of 33% from the prior year!

Phishing—fraudulent emails disguised as legitimate sources attempting to solicit personal information—is now the most popular means of attack. In fact, The HIPAA Journal cites that more than 90% of cyberattacks on healthcare organizations are phishing scams. That means carelessly clicking on one email can have dire consequences for your staff, your patients, and your operation.

Aside from the potential financial burden inflicted by cybercriminals, Health Insurance Portability and Accountability Act (HIPAA) fines can also be debilitating. If you fall prey to data breaches, you can potentially be fined tens of thousands of dollars per violation. Case in point, a medical group in Louisiana recently paid a staggering fine of $480,000, settling the first-ever cyberattack investigation conducted by HHS’ Office for Civil Rights. This was all the result of a basic phishing scam where a cybercriminal gained access to the medical group’s Microsoft 365 environment, the storage point for their patients’ protected health information (PHI).

More Endpoints and Fewer Resources Make Healthcare Easier Targets

Simply put, effective cybersecurity needs both advanced technology and human expertise. However, according to the report, The State of Cybersecurity for Mid-Sized Businesses in 2023, Huntress discovered over 60% of respondents didn’t have any dedicated cybersecurity experts on staff. That’s because many small- and mid-sized businesses (SMBs) are constrained, struggling to attain just one of these core components. Due to a variety of economic factors, SMBs—both within and beyond healthcare—have had to reduce budgets, which means foregoing much-needed investments in cybersecurity products and people.

According to the Healthcare Information and Management Systems Society (HIMSS), healthcare organizations typically spend less than 6% of their overall IT budgets on cybersecurity. Making matters worse, there’s a profound shortage of cybersecurity talent, so filling internal roles with qualified candidates has become a rising challenge. And with top talent being few and far between, the best candidates are commanding top-level salaries, which at times are out of reach for smaller healthcare organizations.

Aging tech isn’t helping matters either. Outdated equipment and legacy operating systems have become easy points of access for cybercriminals. Therefore, smaller healthcare organizations are ideal targets due to weaker defenses. With limited budgets and less manpower, your IT team may be stretched thin or may not possess the cybersecurity expertise to manage evolving cyber threats.

Adding to the chaos, there are more endpoints to protect than ever before. Over the past decade, most notably throughout COVID, remote work and telehealth have grown significantly. The good news is patients can now receive care from the comfort of their own homes, and providers like you can monitor and assist them from off-site. However, this level of care demands more avenues to access data, specifically via tablets, laptops, and mobile devices. Conversely, this also means there are now more attack surfaces for unscrupulous actors to access your data.

The Threat Landscape is Evolving, for the Worse

One reason threats are becoming more frequent is because cybercriminals are becoming more organized. And more ruthless. It’s no longer a mischievous loner in a dark basement, hunched over a monitor, hiding behind a black hoodie. These are sophisticated criminal entities that can carry out carefully choreographed heists. Imagine Ocean’s Eleven, but with less style and far less remorse.

U.S. intelligence has even uncovered hacking groups tied to hostile nations. Also known as advanced persistent threats (APTs), these state-sponsored cybercriminals have the means to debilitate everything from water-treatment plants to natural gas pipelines to electric grids. If these groups have grown powerful enough to take out military and civilian infrastructure, your small- to mid-sized healthcare organization is no challenge. For them, you’re just a drive-by ATM.

In the Huntress report, The State of Cybersecurity for Mid-Sized Businesses in 2023, it was revealed that nearly 25% of SMBs have either suffered a cyberattack or didn’t even realize they had suffered one in the past year.

Cybercriminals are now hiding in plain sight. They’ve advanced beyond the point of standard ransomware tactics, and they’re “blending into” your normal IT operations to exploit built-in system functionalities. This makes it easier for them to gain control over legitimate applications, such as remote monitoring and management (RMM), to manipulate your systems. For instance, cybercriminals can use living-off-the-land binaries (LOLBins)—trusted executables pre-installed on your operating systems—and exploit them for malicious intent. If these threat actors are no longer just relying on custom malware, then your standard spam filters or anti-malware solutions just aren’t enough. Therefore, you need visibility into your entire security system.

You Can Take Action Now with a Few Solutions

When it comes to healthcare cybersecurity, there’s a lot on the line—including lives—so it’s important that organizations like yours are vigilant and proactive. Because no single layer of your security is completely safe anymore, you must adopt a defense-in-depth approach.

This entails creating layers to your defenses with solutions such as intrusion prevention, data encryption, threat detection, patch management, and more. So if a threat bypasses one of these countermeasures, there’s another layer to stop it from slipping through the cracks. A layered approach, however, likely requires ongoing monitoring and fine-tuning. If you happen to lack the in-house resources and expertise to manage your cybersecurity, rest assured there are a variety of simple solutions you can still implement to achieve effective protection, with one of the most potent being a managed EDR.

Security Awareness Training (SAT)

Introduce SAT to educate your staff on cybersecurity best practices. These programs can include phishing simulations and relevant cyber threat lessons that can guide them to make smarter decisions to keep your organization and your patients safe. When it comes to SAT programs, it’s advised you introduce engaging, story-driven lessons, as those are proven to be more effective for knowledge retention.

Multi-Factor Authentication (MFA)

MFA adds an extra layer of protection by requiring your staff to use a second verification factor, such as a personal phone or a security token, to gain access to an account. You’ve likely seen MFA used when logging into your banking app or even your go-to streaming service. The benefit of MFA is it goes beyond usernames and passwords, which can easily be lost, forgotten, or stolen.

Managed EDR

This can be the most powerful and cost-effective solution for your healthcare organization. By coupling advanced technology with human-led analysis, a managed EDR performs critical cybersecurity tasks on your behalf, namely:

  • Monitoring and collecting endpoint data
  • Detecting and investigating threats
  • Triaging alerts
  • Providing actionable remediation steps, including one-click solutions

Easy to deploy, Huntress Managed EDR is fully managed and monitored by a 24/7 Security Operations Center. These cybersecurity experts have your back from the first signs of suspicious activity all the way to remediation.

Huntress Safeguards Healthcare’s Cybersecurity Needs

As healthcare organizations sit in the crosshairs of cybercriminals, it’s absolutely vital you keep your defenses up. This is especially important in a world marked by ever-expanding threats and shrinking budgets.

Cybercriminals are now smarter, more coordinated, and definitely more unforgiving. They don’t care who they hurt, just so long as they can turn a quick profit. Therefore, it’s critical you bolster your cybersecurity in order to protect your organization, your staff, and your patients.

Building a thorough defense infrastructure, however, requires sizable capital, resources, and expertise. While smaller healthcare organizations can find it difficult to prioritize these, there are solutions. Evaluate potential risks. Educate your staff on cyber threats. And adopt a managed EDR. Just like in medicine, even the most basic preventive measures can stop the spread of something far more harmful.

Schedule a Trial Today

Huntress can help healthcare organizations like yours remain secure from ever-evolving cybersecurity threats. Schedule your free trial today.

Attending HIMSS 2024?

In Orlando, from March 11 to 15, you can visit Huntress in Booth 1616. Come learn more about how Huntress can help your healthcare organization thwart cyberattacks.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
http://www.indiavpn.org/2024/02/21/cybersecurity-for-healthcare-diagnosing-the-threat-landscape-and-prescribing-solutions-for-recovery/feed/ 0
SaaS Compliance through the NIST Cybersecurity Framework http://www.indiavpn.org/2024/02/20/saas-compliance-through-the-nist-cybersecurity-framework/ http://www.indiavpn.org/2024/02/20/saas-compliance-through-the-nist-cybersecurity-framework/#respond Tue, 20 Feb 2024 19:54:16 +0000 https://www.indiavpn.org/2024/02/20/saas-compliance-through-the-nist-cybersecurity-framework/ [ad_1]

Cybersecurity Framework

The US National Institute of Standards and Technology (NIST) cybersecurity framework is one of the world’s most important guidelines for securing networks. It can be applied to any number of applications, including SaaS.

One of the challenges facing those tasked with securing SaaS applications is the different settings found in each application. It makes it difficult to develop a configuration policy that will apply to an HR app that manages employees, a marketing app that manages content, and an R&D app that manages software versions, all while aligning with NIST compliance standards.

However, there are several settings that can be applied to nearly every app in the SaaS stack. In this article, we’ll explore some universal configurations, explain why they are important, and guide you in setting them in a way that improves your SaaS apps’ security posture.

Start with Admins

Role-based access control (RBAC) is a key to NIST adherence and should be applied to every SaaS app. There are two types of permissions within a SaaS application. Functional access covers things like creating accounts and navigating the application. Data access permissions, on the other hand, govern which users can retrieve and modify data. The admin account (or the super-admin account in some apps) is the most sensitive within the app, as it has full access to both types of permissions.

For threat actors, breaching an admin account is akin to winning the lottery. They have access to everything. Organizations must do everything within their power to maintain control over these accounts. This control is managed through configurations and best practices.

Implement Limited Redundancy

It’s important to have a minimum of two admins for every application. This redundancy makes it difficult for an admin to act alone against the best interests of the organization, as admins can monitor each other for any signs of a breach.

However, each admin increases the application’s attack surface. Organizations must strike a balance between having enough admins to adequately service the application while limiting exposure. An automated review of the number of admins should trigger alerts when the number of admins is outside the preferred range.

Eliminate External Admins

External admins introduce a new layer of uncertainty into SaaS security. Because they sit outside the organization, the security team can’t control the password policies or authentication tools that they use.

For example, should a threat actor try to log into your application and click Forgot Password, there is no way to know whether the threat actor can breach the external admin’s email account. That lack of oversight of external users could lead to a deep breach of your SaaS application, which is why NIST advises against having external admins. Depending on the application, either block external admins from getting admin privileges or identify external users with admin rights and remove those privileges.

For companies that hire an external IT company or outsource to MSSPs, those individuals should not be considered external. However, they should continue to monitor for other external users being given admin permissions.

Require Admin MFA

To comply with NIST standards, all admin user accounts should be required to access the application using multi-factor authentication (MFA), such as a one-time password (OTP). MFA requires users to present a minimum of two forms of ID before it authenticates the user. A threat actor would need to compromise two authentication systems, increasing the level of difficulty of the compromise and reducing the risk to the account. Make sure to set MFA for admins as required (we also recommend MFA for all users, but it is a must-have for admins).

Download this checklist and learn how to align your SaaS security with NIST

Prevent Data Leaks

SaaS data leaks pose significant risks to organizations and their users, potentially compromising sensitive information stored within cloud-based applications. SaaS applications are marketed as collaboration tools. However, the configurations that enable users to work together can also compromise files and data. NIST, for its part, advocates monitoring the permissions of every resource.

A visible calendar can expose employees to socially engineered phishing attacks, while shared repositories can lead to a company’s internal source code being shared publicly. Email, files, and boards all contain sensitive data that should not be accessible to the public. While the following configurations are often called something different in each application, almost any app that stores content will have this type of control.

Stop Public Sharing

The difference between Share with All and Share with a User is profound. When items are shared with all, anyone with a link can access the materials. Share with a User, in contrast, adds an additional authentication mechanism, as the user needs to log in before accessing the material.

To reduce the content that is exposed, app admins should disable sharing over public URLs (“Anyone with the link”). In addition, some applications allow users to revoke access to URLs that have already been created. When available, organizations should be sure to toggle that setting to on.

Set Invitations to Expire

Many applications allow authorized users to invite external users to the application. However, most applications don’t implement an invite expiration date. In those circumstances, invites sent years prior can provide access to a threat actor who has just breached an external user’s email account. Enabling an auto-expiration date on invites eliminates that type of risk.

It’s worth noting that in some apps, configuration changes are retroactive, while others will only take effect moving forward.

Align your SaaS Security with NIST standards – download the full guide

Strengthening Passwords to Harden Application Security

Passwords are the first line of defense against unauthorized access. NIST advocates for a strong and well-managed password policy, which is essential to protect sensitive user data, confidential business information, and proprietary assets stored within the cloud-based infrastructure. The uniqueness, complexity, and regular updating of passwords are critical aspects of a robust security posture.

Passwords serve as a fundamental element in a layered security approach, complementing other security measures such as multi-factor authentication (MFA) and encryption. Compromised passwords can be a gateway for malicious actors to exploit vulnerabilities in the SaaS environment. The effective management of passwords enhances the overall resilience of SaaS systems, contributing to a more secure and trustworthy digital ecosystem for both businesses and their users.

Prevent Password Spray Attacks

In a spray attack, threat actors enter a username and common password terms, hoping to get lucky and access the application. Requiring MFA is the recommended way to prevent password spray attacks. For those that don’t insist on employees using MFA as part of the authentication process, many apps allow organizations to ban words from being used as passwords. This list of words would include terms like password1, letmein, 12345, and the names of local sports teams. Additionally, it would include terms like the user’s name, company products, partners, and other business terms.

Going into the configurations and adding a custom banned words list can significantly reduce the risk of a successful password spray attack.

Password Complexity

Most SaaS applications allow the organization to customize password complexity. These range from allowing any password to requiring alphanumeric characters, capital and lowercase letters, symbols, or a password length. Update the password requirements in the app to match your organization’s policy.

If your organization doesn’t have a password policy, consider following NIST guidelines:

  1. Don’t make mandatory password changes, as users tend to choose easy-to-remember passwords.
  2. Use long passwords over complex ones. Combinations of numbers, special characters and lower/upper case characters usually follow a format like this: Password1!. These are easy to brute force. A long password like MyFavoriteDessertIsPecanPie is easy to remember but with 27 characters, difficult to brute force.
  3. Limit password attempts to no more than 10.
  4. Screen passwords against published passwords and other easy to guess words with a banned words list.

Configurations Really Matter

Approximately 25% of all cloud-related security incidents start with a misconfigured setting. In addition to those mentioned here relating to access, password, and data leaks, which are fairly universal, configurations are used for key management, mobile security, operational resilience, phishing protection, SPAM protection, and more. Misconfigurations in any of those areas can lead directly to breaches.

It may seem unlikely that threat actors spend their time looking for misconfiguration that they can exploit. Yet, that is exactly what the Russian state-sponsored group Midnight Blizzard did when it breached Microsoft this year. If misconfigurations can happen at Microsoft, it’s worth reviewing to make sure that your applications are all secure.

See how you can apply NIST standards to your SaaS stack

The Hacker News

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
http://www.indiavpn.org/2024/02/20/saas-compliance-through-the-nist-cybersecurity-framework/feed/ 0
Why We Must Democratize Cybersecurity http://www.indiavpn.org/2024/02/16/why-we-must-democratize-cybersecurity/ http://www.indiavpn.org/2024/02/16/why-we-must-democratize-cybersecurity/#respond Fri, 16 Feb 2024 12:36:42 +0000 https://www.indiavpn.org/2024/02/16/why-we-must-democratize-cybersecurity/ [ad_1]

Democratize Cybersecurity

With breaches making the headlines on an almost weekly basis, the cybersecurity challenges we face are becoming visible not only to large enterprises, who have built security capabilities over the years, but also to small to medium businesses and the broader public. While this is creating greater awareness among smaller businesses of the need to improve their security posture, SMBs are often left facing a gap in the market, unable to find security tooling that is both easy for them to use and which they can afford.

When we consider the needs of SMBs, we need to focus both on the development of threat intelligence, which is necessary to understand and identify the threats being faced, as well as the tools used to provide protection. NTTSH has built a pedigree of over 20 years’ experience in the research and curation of threat intelligence as well as the development of capabilities and products which leverage its threat intelligence to protect customers. After many years of focus on larger enterprises, NTTSH is moving to democratize cybersecurity and provide smaller businesses with the protection they require.

Global Threat Intelligence Center

All of NTTSH’s efforts are underpinned by the capabilities of its Global Threat Intelligence Center (GTIC). The efforts of the GTIC go beyond those of a pure research organization by taking threat research and combining it with NTTSH proprietary detective technology to produce applied threat intelligence.

The GTIC’s mission is to protect clients by providing advanced threat research and security intelligence, enabling NTTSH to prevent, detect, and respond to cyber threats. To provide a truly unique vantage point within NTTSH’s products and services, GTIC leverages proprietary intelligence capabilities and NTT’s position as the operator of one of the world’s top 5 tier 1 Internet backbones, providing unequaled visibility of Internet telemetry to gain an understanding of and insight into the various threat actors, exploit tools and malware – and the tactics, techniques, and procedures used by attackers. In addition to curating its own threat intelligence research, GTIC also maintains relationships with other key players in this space, including the Cyber Threat Alliance, Microsoft, CISA, and the National Cyber Forensics and Training Alliance (NCFTA).

NTTSH’s annual Global Threat Intelligence Report (GTIR) provides a window into the work done by GTIC, providing a synopsis of the key challenges in the security landscape facing organizations of all sizes, together with actionable insights to help organizations better adapt to the evolving threat landscape. In the Q3 update of the 2023 GTIR, a special focus was placed on key industry verticals, providing insights into the threats they face.

Threat focus by sector

The healthcare sector faces a unique set of challenges, not only due to the high value of the information owned by healthcare providers but also as a result of steep growth in the adoption of technology in healthcare in a context where many providers, especially smaller ones, lack awareness of cybersecurity and also don’t have the resources to deploy and maintain the kinds of controls enjoyed by large enterprises. Ransomware is still proving particularly problematic. Healthcare ransomware breaches are proving to be particularly concentrated across a few geographies, with the USA, Australia, and the UK accounting for close to 80% of these breaches.

Democratize Cybersecurity
Figure 1: Ransomware victim locations in the Healthcare sector.

A similar geographic trend is visible in the telecommunications sector, where the USA, UK, and Australia account for roughly 52% of ransomware attacks, while in education, the USA, UK, and Canada account for approximately 83%.

Across all of the focus sectors, Lockbit 3.0 remains the most prolific ransomware threat actor. Some ransomware actors are, however, focusing on specific sectors, such as the Bl00dy ransomware gang, which specifically targets education.

Democratize Cybersecurity
Figure 2: Top ransomware actors in the telecommunications sector

Security Challenges of SaaS

A recent area of focus for GTIC has been the way in which the rapidly accelerating adoption of SaaS is presenting its own set of challenges. SaaS is rapidly becoming an integral part of the day-to-day operations of both small and large businesses, with annual growth expected to continue at a rate of close to 20% through 2027. In this context, it is important to note that 99% of cloud security breaches are expected to be the customer’s fault, according to Gartner.

The shared responsibility model for cloud services has been something that larger enterprises have been familiar with for some time already. Smaller organizations are, however, still coming to grips with this model. In respect of SaaS, this means that while the cloud provider is responsible for the application, SMBs are still adapting to the fact that they retain responsibility for their data and, crucially, manage their accounts and identities. Threat actors are, as a result, focusing on ways to compromise identities, especially using techniques such as credential stuffing and phishing.

Facing up to the Challenges of Hybrid IT

While SMBs were previously able to rely on antivirus software and firewalls to protect the technology assets on their premises, most have now moved into the world of hybrid IT as they increasingly rely on cloud-delivered services. While the security controls provided by most cloud services are good, SMBs face a variety of challenges in using the security functionality that is available to them.

As the attack surface of even smaller companies expands, the number of sources of security alerting grows. That is not the only challenge: threat actors will often not confine their activities to one part of your technology estate. They may start in one area, for instance, by compromising one or more endpoints (such as laptops) and then use the information they gather (such as credentials) to move laterally, for instance, to compromise a SaaS application. While large enterprises have spent the last 10 years or more building dedicated SecOps teams and intricate security toolchains, SMBs lack the resources for this kind of investment.

Democratizing Security Operations with XDR

What SMBs need is the ability to bring alerting from all of their IT infrastructure and applications into a single tool, which can analyze all of an organization’s telemetry, apply threat intelligence, and then provide a simple interface that acts as a single pane of glass for managing alerting, performing investigations and responding to threats. This is where XDR provides a solution that combines the key components of a traditional SecOps toolchain in a single cloud-hosted application, which can be delivered affordably. This is the second key area where NTTSH has turned its focus towards SMBs by focusing the development of its Samurai XDR product on the needs and budgets of SMBs while still delivering the functionality that large enterprises have become accustomed to. While GTIC’s research provides the intelligence needed to understand and detect the threats facing modern organizations, Samurai XDR makes GTIC’s work accessible and actionable even for organizations that lack dedicated SecOps resources. It is crucial to remember that while threat intelligence is essential to be able to detect threats, every organization needs tools in order to apply it.

A brief journey through Samurai XDR

From the start, Samurai XDR is designed to be easy to use and, most importantly, to be accessible to all IT staff, not only to security analysts. The starting point of all workflows in Samurai XDR is the alerts dashboard. This is where the system presents security alerts which have been prioritized based on severity and confidence.

Democratize Cybersecurity
Figure 3: Samurai XDR Alerts Dashboard

The alerts dashboard brings together alerts from all of the technologies used by the organization into a single prioritized view, with a focus on providing an intuitive interface that can be used by most IT staff, not only by specialist security analysts.

Once the user has decided that an alert warrants further investigation, the Investigations view provides a similarly simple and intuitive interface for managing the lifecycle of an investigation of a potential security incident.

Once events and alerts are processed, they are stored in Samurai XDR’s data lake. The data lake provides the ability for users to query and analyze all of the events ingested into Samurai XDR, going back up to one full year. This makes it possible to interrogate a full year’s historical data for purposes such as threat hunting – allowing Samurai XDR users to perform detailed analyses of historical events for any signs of threats that may have been dwelling for longer periods of time. Querying the events in the data lake is made possible by Samurai XDR’s Advanced Query function, which allows users to search the data lake both graphically and using Microsoft’s Kusto Query Language (KQL).

Integrations

Integrations provide the mechanism to ingest telemetry (such as logs) from your IT infrastructure and applications into Samurai XDR. NTTSH has focused on bringing together the right mix of capabilities to ingest telemetry from both on-premises infrastructure and cloud services, mirroring the kind of hybrid IT environment that has become typical for even most SMBs today. Some examples of integrations currently available include:

  • Cloud: Azure Management Plane and Microsoft 365 (coming soon), Google Workspace (coming soon)
  • Endpoint Detection and Response: Microsoft Defender for Endpoint, VMWare Carbon Black and Crowdstrike Falcon Insight
  • Next-Generation Firewalls: Cisco Secure Firewall (ASA and Firepower Threat Defense), Fortinet Fortigate, and Palo Alto Networks NGFW.

Over the coming months, NTTSH will be busy adding more integrations, including but not limited to Meraki, Bitdefender, Sophos, Zoom, MalwareBytes, OneLogin, OKTA, Zscaler, AWS, and many more!

Making it Easy

A key area of focus for NTTSH in the development of Samurai XDR has been that of making it easy to use and easy to afford. For example, the configuration of integrations is supported by simple “point and click” workflows. For infrastructure that provides logs via syslog, all that is needed is to point the log source at Samurai XDR’s secure syslog collector, and Samurai XDR will do the work of detecting the kind of device that is sending logs. Naturally, it’s the same for cloud integrations. Samurai XDR keeps the steps to a minimum and guides the user through interactive steps and access to knowledge-base articles.

Samurai XDR also follows a simple pricing model – based solely on the number of endpoints that the customer has, removing the need to try to estimate the data volumes of the telemetry that will be ingested into the platform. Standard pricing for 50 endpoints or more is only $3.33 per endpoint per month, and for smaller customers, there is a Starter Pack for up to 25 endpoints, which is priced at $750 for a year.

To make it easy to try out Samurai XDR, NTTSH is providing all new customers with a free 30-day trial, making it possible to experience all of its functionality without any commitments, giving even the smallest SMBs a risk-free route to building an advanced SecOps capability.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
http://www.indiavpn.org/2024/02/16/why-we-must-democratize-cybersecurity/feed/ 0
Cybersecurity Tactics FinServ Institutions Can Bank On in 2024 http://www.indiavpn.org/2024/02/14/cybersecurity-tactics-finserv-institutions-can-bank-on-in-2024/ http://www.indiavpn.org/2024/02/14/cybersecurity-tactics-finserv-institutions-can-bank-on-in-2024/#respond Wed, 14 Feb 2024 12:55:58 +0000 https://www.indiavpn.org/2024/02/14/cybersecurity-tactics-finserv-institutions-can-bank-on-in-2024/ [ad_1]

FinServ Threat Landscape

The landscape of cybersecurity in financial services is undergoing a rapid transformation. Cybercriminals are exploiting advanced technologies and methodologies, making traditional security measures obsolete. The challenges are compounded for community banks that must safeguard sensitive financial data against the same level of sophisticated threats as larger institutions, but often with more limited resources.

The FinServ Threat Landscape

Recent trends show an alarming increase in sophisticated cyber-attacks. Cybercriminals now deploy advanced techniques like deep fake technology and AI-powered attacks, making it increasingly difficult for banks to differentiate between legitimate and malicious activities. These developments necessitate a shift towards more sophisticated and adaptive cybersecurity measures. Take these industry statistics, for example.

  • Financial firms report 703 cyberattack attempts per week.1
  • On average, 270 attacks (entailing unauthorized access of data, applications, networks, or devices) occurred in financial services, an increase of 31% compared with the prior year.2
  • On average, financial services businesses take an average of 233 days to detect and contain a data breach.3
  • 43% of senior bank executives don’t believe their bank is adequately equipped to protect customer data, privacy, and assets in the event of a cyberattack.4
  • The average data breach cost in financial services is $5.72 million per incident.5

State-sponsored cyberattacks also pose a unique threat to the financial sector. These attacks are often highly sophisticated and well-funded, aimed at destabilizing financial systems or stealing sensitive economic information. Community banks must be prepared to defend against these high-level threats, which require a different approach than conventional cybercriminal activities.

Similarly, in recent times, there has been a concerning trend where major service providers catering to small-medium-sized banks, such as FIS, Fiserv, and Jack Henry, have become prime targets for cyber-attacks. Targeting these service providers allows threat actors to widen their net and make their attempts more efficient, as compromising a single service provider can potentially provide access to multiple small banks. This underscores the critical importance of strong vendor management governance. Community banks must be prepared to defend against these high-level threats, which require a different approach than conventional cybercriminal activities.

Proactive measures can be taken to overcome the threats facing the FinServ industry. Companies like ArmorPoint provide complimentary Cybersecurity Workshops where they have seasoned cybersecurity experts identify specific security gaps and produce recommendations to mitigate those risks.

Top 5 FinServ Cybersecurity Challenges and How to Overcome Them

1. Advanced Cloud Security Strategies

Cloud computing, with its numerous benefits of scalability, flexibility, and cost-effectiveness, is increasingly being adopted by financial institutions. However, this shift introduces specific security concerns that can be challenging to manage. The complexity of cloud security stems from the need to protect data across diverse and dynamic environments. In the cloud, data often moves across various services and geographies, making traditional perimeter-based security approaches less effective. Additionally, the shared responsibility model in cloud computing can lead to ambiguity in security roles and responsibilities between the cloud service provider and the bank.

To address these challenges, banks must adopt advanced cloud security strategies. This involves implementing comprehensive data encryption to protect data at rest and in transit, and robust identity and access management systems to control who can access what data and under what conditions. Zero-trust security models, where trust is never assumed and verification is required from everyone trying to access resources in the network, are increasingly vital. Understanding the nuances of different cloud environments—public, private, and hybrid—is also key to tailoring security measures effectively.

2. Ransomware: Beyond Basic Defense

Ransomware attacks in the financial sector have become increasingly sophisticated, leveraging tactics like “Ransomware as a Service” (RaaS) to target institutions. The evolving nature of ransomware, combined with the high value of financial data, makes these institutions particularly vulnerable. Traditional defense strategies are often inadequate in the face of such advanced threats, which can bypass standard security measures and encrypt critical data, causing operational disruptions and financial losses.

Banks need to implement a multi-layered defense strategy against ransomware. This includes advanced threat intelligence systems that can provide real-time insights into emerging threats and vulnerabilities. Regular security audits are crucial to identify and address potential vulnerabilities in the bank’s cybersecurity infrastructure. Additionally, proactive threat hunting teams can play a critical role in identifying and neutralizing threats before they materialize, providing an additional layer of defense against ransomware attacks.

3. Comprehensive Vendor Risk Management

Financial institutions increasingly rely on third-party vendors for a range of services, from cloud computing to customer relationship management. Each vendor relationship introduces potential cybersecurity risks, as vendors may have access to or manage sensitive bank data. Managing these risks is complicated by the differing security postures and practices of various vendors, making it challenging to ensure consistent security standards across all third-party relationships.

Effective vendor risk management goes beyond initial security assessments and requires continuous monitoring and evaluation of vendor security practices. Regular security audits of vendors are essential to ensure they adhere to agreed-upon security standards and practices. Integrating vendor risk management into the bank’s overall cybersecurity strategy ensures a unified approach to security, reducing the likelihood of vendor-related security breaches.

4. Regulatory Compliance: Navigating a Complex Landscape

The regulatory landscape for cybersecurity in the financial sector is intricate and constantly evolving. Banks are required to comply with a wide range of international, national, and regional regulations, each with its own set of requirements and penalties for non-compliance. Navigating this complex landscape is challenging, as banks must continually adapt their cybersecurity strategies to meet these evolving requirements.

To effectively navigate this landscape, community banks must develop a deep understanding of relevant regulations, such as the GBLA, PCI DSS, SOX, and more. This involves establishing a dedicated compliance team, or even utilizing a virtual Chief Information Security Officer (vCISO), responsible for staying abreast of regulatory changes and ensuring that the bank’s cybersecurity practices align with these requirements. Regular training and awareness programs for all staff are also crucial to ensure widespread understanding and adherence to compliance requirements.

5. Bridging the Cybersecurity Talent Gap

The cybersecurity talent gap poses a significant challenge for financial institutions. The rapidly evolving nature of cyber threats requires skilled professionals who are up to date with the latest technologies and strategies. However, there is a shortage of such professionals in the market, making it difficult for banks to recruit and retain the talent needed to effectively manage their cybersecurity risks.

Banks must adopt creative solutions to bridge this talent gap. Developing internal training programs can help upskill existing staff, making them capable of handling more complex cybersecurity tasks. Collaborating with educational institutions to develop tailored cybersecurity curriculums can help create a pipeline of skilled professionals. Additionally, leveraging AI and automation for routine security tasks can free up human resources for more complex and strategic cybersecurity challenges, optimizing the use of available talent.

Furthermore, another viable strategy for addressing the talent gap is outsourcing. Financial institutions can consider outsourcing security operations talent, partnering with specialized firms to provide expert cybersecurity services. This approach allows banks to access a pool of seasoned professionals who can monitor, detect, and respond to security threats effectively. Additionally, outsourcing executive-level insights, such as a virtual Chief Information Security Officer (vCISO), can provide strategic guidance and governance to strengthen the bank’s overall cybersecurity posture. By outsourcing specific talent needs, banks can bridge the talent gap more effectively while maintaining a strong focus on cybersecurity excellence.

ArmorPoint has recently released a security maturity self-assessment. Take the 15-question quiz to determine the gaps in your security posture.

Three Steps to Implement a Robust Cybersecurity Framework

An integrated approach to cybersecurity is imperative for effectively managing these diverse challenges. This involves creating a cohesive framework that combines advanced technology solutions, thorough policies and procedures, regular risk assessments, continuous monitoring, and proactive incident response planning.

Steps to Implement a Robust Cybersecurity Framework

Step 1: Strategic Alignment and Planning

The cornerstone of a successful cybersecurity program lies in its strategic alignment and planning. This critical first step involves setting clear cybersecurity goals that are closely aligned with the business objectives of the organization. Integration of security controls into the organizational strategy is essential, ensuring every business aspect is underpinned by robust security measures. An effective strategy also includes the creation of a risk prioritization framework, which is instrumental in identifying and focusing on the most critical threats. Furthermore, the development of a security architecture, tailored to the specific needs and risk profile of the organization, is crucial. This architecture needs to be dynamic, evolving in tandem with the changing landscape of cybersecurity threats and business requirements.

Step 2: Risk-Centric Action and Deployment

The second phase of developing a cybersecurity program is centered around risk-centric action and deployment. This involves establishing an efficient team structure, one that is dedicated to the meticulous implementation of the cybersecurity strategy. A key component of this phase is the deployment of the necessary tools and technologies that bring the strategic plan to life. Translating high-level strategies into actionable, practical steps is essential for effective execution. Strategic allocation of resources, especially in areas with higher perceived risks, ensures that critical aspects of the network are prioritized and reinforced. Moreover, the importance of continuous monitoring and management of security systems cannot be overstated, as they are vital for maintaining the efficacy of security measures and for addressing emergent threats swiftly.

Step 3: Continuous Recalibration and Optimization

In the final phase, the focus shifts to the continuous recalibration and optimization of the cybersecurity program. This phase demands maintaining accountability at all organizational levels and enhancing incident response capabilities to ensure swift and effective reactions to threats. Cultivating a culture that is aware of cybersecurity, through the education of employees and stakeholders about security best practices and risks, forms the bedrock of this phase. Regular evaluations and transparent communication of the program’s effectiveness to key stakeholders are crucial for fostering an environment of continuous improvement. The cybersecurity strategies should be under constant review and refinement based on ongoing assessments. This adaptive approach ensures that cybersecurity measures remain both effective and relevant, aligning with the ever-evolving business environment and the shifting landscape of cyber threats.

Preparing for Emerging Trends and Future Threats

The future of cybersecurity in the financial sector is likely to be shaped by emerging technologies and evolving threat landscapes.

AI and Machine Learning in Cybersecurity

The integration of AI and machine learning in cybersecurity tools is set to revolutionize threat detection and response. These technologies can analyze vast amounts of data to identify patterns indicative of cyber threats, offering a level of speed and efficiency unattainable by human analysts alone.

The Role of Blockchain in Enhancing Security

Blockchain technology has the potential to offer enhanced security features for financial transactions and data integrity. Its decentralized and immutable nature makes it an attractive option for securing transaction records and preventing fraud.

Cyber threats are constantly evolving; community banks must stay vigilant and proactive in their cybersecurity efforts. Embracing comprehensive and integrated cybersecurity strategies, focusing on cyber resilience, and preparing for future technological advancements are key to safeguarding against the diverse and sophisticated threats in the cyber landscape. By staying ahead of these challenges, financial institutions can ensure the security and continuity of their operations, maintaining the trust and confidence of their customers.

For more information about how you can enhance the security of your regional financial institution, explore ArmorPoint’s solutions and experience the power of a unified approach to cybersecurity program management.

Resources

1 https://blog.checkpoint.com/security/check-point-research-cyber-attacks-increased-50-year-over-year/

2 https://www.accenture.com/us-en/insights/security/state-cybersecurity

3 https://info.varonis.com/hubfs/docs/research_reports/2021-Financial-Data-Risk-Report.pdf?hsLang=en

4 https://kpmg.com/us/en/articles/2022/cybersecurity.html

5 https://www.ibm.com/reports/data-breach


Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
http://www.indiavpn.org/2024/02/14/cybersecurity-tactics-finserv-institutions-can-bank-on-in-2024/feed/ 0
Midnight Blizzard and Cloudflare-Atlassian Cybersecurity Incidents: What to Know http://www.indiavpn.org/2024/02/13/midnight-blizzard-and-cloudflare-atlassian-cybersecurity-incidents-what-to-know/ http://www.indiavpn.org/2024/02/13/midnight-blizzard-and-cloudflare-atlassian-cybersecurity-incidents-what-to-know/#respond Tue, 13 Feb 2024 12:18:05 +0000 https://www.indiavpn.org/2024/02/13/midnight-blizzard-and-cloudflare-atlassian-cybersecurity-incidents-what-to-know/ [ad_1]

Feb 13, 2024The Hacker NewsSaaS Security / Data Breach

Cloudflare-Atlassian Cybersecurity Incidents

The Midnight Blizzard and Cloudflare-Atlassian cybersecurity incidents raised alarms about the vulnerabilities inherent in major SaaS platforms. These incidents illustrate the stakes involved in SaaS breaches — safeguarding the integrity of SaaS apps and their sensitive data is critical but is not easy. Common threat vectors such as sophisticated spear-phishing, misconfigurations and vulnerabilities in third-party app integrations demonstrate the complex security challenges facing IT systems.

In the case of Midnight Blizzard, password spraying against a test environment was the initial attack vector. For Cloudflare-Atlassian, threat actors initiated the attack via compromised OAuth tokens from a prior breach at Okta, a SaaS identity security provider.

What Exactly Happened?

Microsoft Midnight Blizzard Breach

Microsoft was targeted by the Russian “Midnight Blizzard” hackers (also known as Nobelium, APT29, or Cozy Bear) who are linked to the SVR, the Kremlin’s foreign intelligence service unit.

In the Microsoft breach, the threat actors:

  1. Used a password spray strategy on a legacy account and historic test accounts that did not have multi-factor authentication (MFA) enabled. According to Microsoft, the threat actors “[used] a low number of attempts to evade detection and avoid account blocks based on the volume of failures.”
  2. Leveraged the compromised legacy account as an initial entry point to then hijack a legacy test OAuth app. This legacy OAuth app had high-level permissions to access Microsoft’s corporate environment.
  3. Created malicious OAuth apps by exploiting the legacy OAuth app’s permissions. Because the threat actors controlled the legacy OAuth app, they could maintain access to the applications even if they lost access to the initially compromised account.
  4. Granted admin Exchange permissions and admin credentials to themselves.
  5. Escalated privileges from OAuth to a new user, which they controlled.
  6. Consented to the malicious OAuth applications using their newly created user account.
  7. Escalated the legacy application’s access further by granting it full access to M365 Exchange Online mailboxes. With this access, Midnight Blizzard could view M365 email accounts belonging to senior staff members and exfiltrate corporate emails and attachments.
Cloudflare-Atlassian Cybersecurity Incidents
Recreation of illustration by Amitai Cohen

Cloudflare-Atlassian Breach

On Thanksgiving Day, November 23, 2023, Cloudflare’s Atlassian systems were also compromised by a nation-state attack.

  1. This breach, which started on November 15, 2023, was made possible through the use of compromised credentials that had not been changed following a previous breach at Okta in October 2023.
  2. Attackers accessed Cloudflare’s internal wiki and bug database, enabling them to view 120 code repositories in Cloudflare’s Atlassian instance.
  3. 76 source code repositories related to key operational technologies were potentially exfiltrated.
  4. Cloudflare detected the threat actor on November 23 because the threat actor connected a Smartsheet service account to an admin group in Atlassian.
SaaS Security Guide

Can Your Security Team Monitor 3rd Party Apps? 60% of Teams Can’t

Think your SaaS security is top-notch? Appomni surveyed over 600 global security practitioners, and 79% of professionals felt the same – yet they faced cybersecurity incidents! Dive into the insights of the AppOmni 2023 Report.

Learn How You Can

Threat Actors Increasingly Target SaaS

These breaches are part of a broader pattern of nation-state actors targeting SaaS service providers, including but not limited to espionage and intelligence gathering. Midnight Blizzard previously engaged in significant cyber operations, including the 2021 SolarWinds attack.

These incidents underscore the importance of continuous monitoring of your SaaS environments and the ongoing risk posed by sophisticated cyber adversaries targeting critical infrastructure and operational tech stack. They also highlight significant vulnerabilities related to SaaS identity management and the necessity for stringent 3rd-party app risk management practices.

Attackers use common tactics, techniques and procedures (TTPs) to breach SaaS providers through the following kill chain:

  1. Initial access: Password spray, hijacking OAuth
  2. Persistence: Impersonates admin, creates extra OAuth
  3. Defense Evasion: Highly privileged OAuth, no MFA
  4. Lateral Movement: Broader compromise of connected apps
  5. Data Exfiltration: Grab privileged and sensitive data out of apps

Breaking the SaaS Kill Chain

One effective way to break the kill chain early is with continuous monitoring, granular policy enforcement, and proactive lifecycle management over your SaaS environments. A SaaS Security Posture Management (SSPM) platform like AppOmni can help with detecting and alerting on:

  • Initial Access: Out-of-the-box rules to detect credential compromise, including password spraying, brute force attacks, and unenforced MFA policies
  • Persistence: Scan and identify OAuth permissions and detect OAuth hijacking
  • Defense Evasion: Access policy checks, detect if a new identity provider (IdP) is created, detect permission changes.
  • Lateral Movement: Monitor logins and privileged access, detect toxic combinations, and understand the blast radius of a potentially compromised account
Cloudflare-Atlassian Cybersecurity Incidents

Note: This expertly contributed article is written by Beverly Nevalga, AppOmni.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
http://www.indiavpn.org/2024/02/13/midnight-blizzard-and-cloudflare-atlassian-cybersecurity-incidents-what-to-know/feed/ 0