Page 86 - Cyber Defense eMagazine January 2024
P. 86

anybody who has digital processes at the core of their business is a potential ransomware  target. Thus,
            point number one is to get over the line of thinking that “I’m not a target” because you most certainly are.

            Second, social engineering is and will always be an attack vector. By their very nature, our digital systems
            demand that human beings interact with them. And as long as there are places where human beings can
            interact  with  systems,  human  beings  can  be  tricked  into  providing  access  to  the  system.  Social
            engineering has been going on since before the internet, and the reason it has persisted for decades and
            decades is because it consistently works.

            How then do we deal with social engineering? For many years, the approach has been training. We do
            recommend  training,  but  training is not even  remotely  sufficient  to solve the  problem.  If it were,  these
            attacks would not continue to succeed. And no matter how much training people receive, they invariably
            make mistakes. They forget, they get distracted, they get taken in by a different flavor of attack that they
            are not used to and fall for it.

            So, what do you need to do? Your best defense is to take the decision making out of the human being's
            hands. If I am supposed to click on a window and put in a username and password, then there are ways
            for me to be tricked. There are ways for someone to trick me into putting my username and password in
            the wrong place. There are ways for someone to trick me into giving my username and password out to
            somebody else.

            In a recent published  attack, bad actors defeated one-time passwords using deep voice fakes spoofing
            the identity of the victim’s internal IT help desk team. When asked for a one-time password the employee
            readily  gave an OTP to this “internal  help desk.” The bad  actors then used that  one-time password  in
            conjunction with a stolen credential to steal access to the company’s systems.


            To the degree that you can remove the decision making  from human beings, you take away the social
            engineering  angle.  Fortunately,  such  a mechanism  has  been  used  for  40 years  and  has  never  been
            defeated.  That  mechanism  is  Public  Key  Infrastructure,  or  “PKI.”  Employees  using  known  devices—
            laptops  or  mobile  devices  or  workstations  that  remain  at  an  office—can  authenticate  their  identities
            automatically  through  the use of digital  certificates  on these  devices.  No known  attack can  defeat the
            cryptographically  unassailable  mechanisms  that assure these certificates  are real and true. And social
            engineering attacks to gain access are defeated.


            So  why  would  network  administrators  fail  to  employ  PKI-based  authentication?  The  main  reason  is
            ignorance.  They  think  that  username-password  is  secure,  or  they  erroneously  think  that  multi-factor
            authentication  (MFA)  is  a  bullet-proof  addition.  However,  every  major  multi-factor  authentication
            mechanism can be defeated by a determined, educated, and well-resourced attacker.

            Multi-factor  authentication  leads users to a false sense of security.  When you have MFA, you begin to
            think that you are beyond attack. In reality, you are beyond attack solely by “spray and pray attackers,”
            but you are not beyond attack by an Advanced Persistent Threat (APT). That is a mistake many people
            make. They put MFA in place,  and they think they have checked  a box that they need not think about
            again. In reality, well-resourced  professional  attackers  can and do frequently  get around it. Taking the
            decision making out of human hands as much as you can is what is most needed because the oddities
            of how the human brain works are not something that you and I are going to solve in our lifetime.





            Cyber Defense eMagazine – January 2024 Edition                                                                                                                                                                                                          86
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   81   82   83   84   85   86   87   88   89   90   91