Page 94 - Cyber Defense eMagazine July 2024
P. 94

Industrial attack inundation

            Industrial attacks are operated by humans and require some level of technical skill. But either the initial
            exploit or the lasting impact is exacerbated by poor cyber hygiene. There are multiple examples of such
            attacks from the last few months, but the biggest was the MOVEit attack in June 2023. At the latest count,
            the attack has impacted close to 2,800 organizations  and almost 95 million individuals. Sadly, education
            and healthcare institutions were most affected.

            The  main  perpetrator  was  the  infamous  Cl0p  cybercrime  gang,  which  industrialized  an SQL  injection
            vulnerability within MOVEit to distribute ransomware widely. The attack was so damaging  that the SEC
            is currently investigating Progress Software – the maker of MOVEit. But whilst the initial breach of MOVEit
            was down to a tenacious human effort from the attackers, organizations are still falling victim to it almost
            a year later. This could be avoided by patching MOVEit.

            Another recent industrialized attack is the Okta support system breach in October 2023. This was caused
            by stolen credentials rather than a highly skilled exploit. While the initial attack on a support system may
            seem innocuous, it prevented Okta from releasing updates to customers for 90 days. The lesson here is
            that every system – no matter how insignificant – must be considered as an entry point, and that the right
            controls have to be in place to prevent infiltration.



            Opportunistic overflow

            The last attack type is opportunistic. These attacks target low-hanging fruit and are the easiest to execute,
            often  relying  on  vulnerabilities  that  have  existed  for years  being  exploited  by  automated  adversaries.
            Log4J  is a  prime  example  of  an opportunistic  attack.  Disclosed  in late  2021,  the  vulnerability  was so
            damaging  because  Log4J  –  an open-source  logging  library  – was  widely  used  in  organizations  of all
            kinds. It’s estimated that 93% of enterprise cloud environments were impacted.

            Checking  for  known  vulnerabilities,  knowing  where  they  are  in your  code  base,  and addressing  them
            would confine the Log4J vulnerability to the annals of history. However, as recently as December 2023,
            two years after the exploit was discovered, a third of applications were still using an unpatched and thus
            vulnerable version of Log4J.

            Similarly, Microsoft Exchange continues to be a rich source for automated attacks, as the UK’s Electoral
            Commission found to its cost in August 2023. Data from the ShadowServer  dashboard shows there are
            more than 88,000 publicly accessible Exchange servers that possibly have critical vulnerabilities.  Some
            may have been mitigated, but when you consider that keeping up to date with patches could remediate
            these vulnerabilities, it’s a frightening figure.



            Turning a downpour into a drop

            With  attackers  tending  to pick  off the easiest  targets,  focusing  on security  fundamentals,  better  cyber
            hygiene, and ensuring the right controls and policies are in place will help head off almost all industrialized
            and opportunistic attacks.




            Cyber Defense eMagazine – July 2024 Edition                                                                                                                                                                                                          94
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   89   90   91   92   93   94   95   96   97   98   99