Page 82 - CDM-CYBER-DEFENSE-eMAGAZINE-December-2018
P. 82

Your Security Auditing is Failing You, and Here’s Why







            A new report on cyberattacks caught my attention. Carbon Black’s November 2018 Quarterly Incident
            Response Threat Report finds that hackers are increasingly destroying security logs to hide attacks.

            Attacks that cover their tracks by disabling or destroying logs are nothing new. What is alarming is the
            prevalence of such attacks: according to the report, 72 percent of incident response (IR) professionals
            encountered this type of attack over the last 90 days.

            As one IR professional remarked, “We’ve seen a lot of destruction of log data, very meticulous cleanup
            of antivirus logs, security logs and denying IR teams the access to data they need to investigate.”

            In this new reality, the question becomes, how do you protect yourself?



                        Active Directory Holds The Keys To The Kingdom



            As the keeper of the keys to the kingdom, identity services are an extremely attractive target for hackers.
            And given Active Directory’s widespread adoption – more than 90 percent of organizations rely on it for
            identity services – it’s especially at risk.

            Statistically  speaking,  your  organization  will  be  hacked  sooner  or  later.  Here  is  a  scenario  that  is
            unfortunately becoming common:

            An attacker breaches the environment by a phishing, password spray, cross-site scripting, or other type
            of attack (the possibilities are virtually endless and constantly changing).  Through lateral movement
            techniques, the attacker gets access to the Domain Admin group. While that is terrible, it’s not actually
            the end goal.





                                 82
   77   78   79   80   81   82   83   84   85   86   87