Page 31 - Cyber Defense Magazine for August 2020
P. 31

that 60-day threshold has begun to pass. Attackers who have been biding their time may soon be ready
            to strike.
            Today’s ransomware attackers don’t operate like they used to. While older ransomware attacks tended
            to  be  “smash  and  grab”  operations  stealing  and  encrypting  any  data  they  could,  human-operated
            Ransomware 2.0 involves attackers spreading throughout the network to identify and target the  most
            valuable information for the highest financial gain. For the largest possible payout, attackers want to take
            down a whole organization, not just one machine. Quickly spreading throughout the network to establish
            a  stronger foothold  is  the  smartest move, and given  that  the average  ransomware payout  was  over
            $111,000 in Q1 2020 (up 33% from the previous quarter), the strategy appears to be working.


            The COVID-19 Lockdown Has Created New Opportunities
            The extensive remote work necessitated by COVID-19 has, unfortunately, exacerbated the issue. Most
            businesses simply were not prepared for this volume of employees working from home, and the sudden
            onset of the crisis meant that they had to make security compromises in the spirit of achieving service
            availability. Naturally, both technology-based and human-based security issues have arisen as a result.

            Network endpoints are more exposed, as employees access the network from the outside rather than
            from within. Employees are pulling data out of the company that may never have been off-premises
            before,  creating  opportunities  for  attackers  to  target  less  secure  machines.  Similarly,  attackers  are
            entering the network via split-tunneling VPNs, which separates personal employee traffic from company
            networks but doesn’t have all the traditional security controls needed to protect the remote systems from
            attacks.  Multi-factor  authentication  can  help  verify  identity  as  employees  work  remotely,  but  some
            organizations still do not mandate its use, and it is not always effective against targeted attacks.


            Phishing and other scams have also noticeably increased during the lockdown, preying on employees
            that are distracted or flustered by the sudden shift in routine, underscoring the fact that organizations
            have less control over employees working remotely.  The number of BYOD devices (laptops, routers,
            access points, etc.) on the network has increased, and it is harder to verify that employees are doing
            things like installing security updates promptly, creating potential vulnerabilities. Even employee turnover
            can create openings for attackers, as it can be harder to verify the full removal of stored credentials and
            other attack paths from all applications and systems. Given that misused or stolen credentials continue
            to be at the center of countless breaches, this poses a significant threat.


            There are tools designed to help protect against these new threats, but they require effective security
            controls at multiple levels of the network. Traditional Endpoint Protection Platforms (EPPs) and Endpoint
            Detection and Response (EDR) tools try to stop attacks at the initial compromise of the system. Still,
            given the potential new vulnerabilities created by extensive remote work, attackers may have an easier
            time bypassing those tools during the current crisis, highlighting the importance of overlapping security
            controls and building in a safety net to boost detection capabilities.









            Cyber Defense eMagazine – August 2020 Edition                                                                                                                                                                                                                        31
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   26   27   28   29   30   31   32   33   34   35   36