Page 30 - Cyber Defense eMagazine August 2024
P. 30

Testing defenses with sector- & function-specific  threats.

            To prepare  themselves  for future  attacks,  organizations  can  utilize BAS  to simulate real-world  attacks
            against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector
            and function within that sector, including specific TTPs.

            The most effective BAS solutions are continuously and quickly updated with new cyber threat information,
            including incorporating  the latest content  from US-CERT  and FBI Flash alerts. Attack simulations  must
            also  be  informed  by  a  broad  base  of  industry  research  findings,  making  integration  between  BAS
            platforms and external threat intelligence networks essential.

            A notable example can be found in the recent US-CERT alert around the indicators of compromise (IOCs)
            and  TTPs  for  Akira  Ransomware  that  were  disclosed  by  the  US  FBI,  CISA,  Europol's  European
            Cybercrime  Centre  (EC3),  and  the  Netherlands'  National  Cyber  Security  Centre  (NCSC-NL).  The
            disclosure was based on research from the FBI, as well as an industry threat research partner.

            Evidence suggests Akira has been targeting a wide range of businesses and critical infrastructure entities
            since March 2023 across North America,  Europe, and Australia. During the initial attacks, threat actors
            leveraging  Akira  ransomware  targeted  Windows-only  systems.  However,  in  April  2023,  they  began
            targeting  VMware  ESXi  virtual  machines  through  a  new  Linux  variant.  It  is  believed  that  as  of  the
            beginning  of this year, the Akira ransomware  group successfully  impacted  over 250 organizations  and
            extorted nearly $42 million USD from its victims.

            BAS  enables  organizations  with  a  similar  profile  to  the  victims  of  Akira  Ransomware  to  implement
            information from such disclosures within their simulations and, in doing so, regularly validate their security
            controls—at  scale  and  in  a production  environment—to  ensure  optimal  performance  against  this  and
            other new and evolving cyber threats.



            Understanding exposure & developing mitigation responses.

            As simulations  proceed,  CISOs will be best served by utilizing  BAS platforms  that can not only create
            highly customized  attacks,  but also integrate  into their solutions to inform their mitigation  priorities and
            develop defensive strategies against the most novel of attack vectors.


            For instance, a global financial services firm recently used BAS to validate the end-to-end efficacy of its
            security tools,  alert and detection  systems,  and incident response  workflows.  They utilized simulations
            that included both known attacks and attacks customized to the organization's  specific architecture and
            industry. They also integrated both their ticketing system and security information and event management
            (SIEM)  system  with  the  BAS  platform  to  determine  whether  their  detection  mechanisms  and  alert
            notifications  were operational,  effective,  and capable  of identifying  and responding  to specific  security
            events.


            The organization  found that notifications  around potential malicious  activity often were not delivered to
            incident  responders.  In  fact,  many  were  being  delayed  for  hours  due  to  the  complex  pipeline  of







            Cyber Defense eMagazine – August 2024 Edition                                                                                                                                                                                                          30
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   25   26   27   28   29   30   31   32   33   34   35