Page 73 - Cyber Defense eMagazine April 2021 Edition
P. 73

The sheer size and scale of the SolarWinds attack indicates that traditional attack mitigation
          strategies and technologies are not adequate on their own for stopping human-guided attacks like APTs or
          advanced ransomware. If an organization isn’t using technology that can detect and stop the lateral move-
          ment component of a typical contemporary cyber-attack, they will continue to be vulnerable and at-risk of a
          successful incursion. Organizations must augment their strategies to stop human-operated attacks as they
          move through their networks and prevent them from accessing systems and endpoints at scale.
          Why are lateral movement attacks still happening?

          With great opportunity comes great evolution, and the lateral movement attacks of the 2020s are more so-
          phisticated than ever before. These kinds of attacks are now so prevalent that they’re used in nearly every
          other kind of cyber-attack, even though the time it takes to detect a network intrusion dropped from 418 days
          in 2011 to 78 days in 2019. Once an attacker is able to establish a
          beachhead, they can cause massive amounts of damage to organizations and even force them out of busi-
          ness.

          There are several reasons why lateral movement attacks are still happening: 1) the size of the
          attack surface makes it difficult to prevent attackers from establishing a beachhead; 2) the attacker has ac-
          cess to increasingly sophisticated tools; and 3) limitations in our existing security controls for detecting and
          preventing lateral movement.

          A notable recent contributor to the increased attack surface is the current pandemic forcing
          employees to work from home (WFH), expanding the attack surface far beyond what security teams expect-
          ed to manage. Employee home networks rarely have the security controls in place that
          corporate networks do, from security appliances to management software. The WFH user can
          represent an easier target for threat actors to establish a beachhead, and once compromised, can offer a
          path to targeted crown jewels. Moreover, the shift to work from home significantly changed the behavior de-
          fined as normal by anomaly-based detection systems, resulting in a significant
          increase in false positive alerts. It’s difficult to establish a baseline for behavior-based detection when nearly
          everyone’s behavior patterns are changing.


          To better exploit this extensive and changing attack surface, attackers have easy access to
          increasingly sophisticated tools. For example, they can access easy to use Ransom-as-a-Service (RaaS),
          with a sophisticated toolset, in exchange for splitting their payouts with the RaaS operator.

          Current security controls are more focused on the perimeter, defensive in nature and relying on
          signatures and anomalies for detection. When the attacker circumvents the perimeter, it’s far too easy for
          them to move laterally without detection. Threat actors look to move laterally within
          networks because before they can steal data, they need to understand what data is available on the network
          in the first place. While extended dwell time makes it easier in some cases to detect and stop the threat
          actors before attacks can hit paydirt, it also means that a straightforward endpoint threat detection and re-
          sponse (EDR) will not always detect activity leveraging legitimate
          connectivity and normal behavior to avoid anomaly-based
          detection.


















             73    Cyber Defense eMagazine – April 2021 Edition
                   Copyright © 2021, Cyber Defense Magazine.  All rights reserved worldwide.
   68   69   70   71   72   73   74   75   76   77   78