Page 145 - Cyber Defense eMagazine June 2024
P. 145

All three have their own intricacies, and while the methods for defending against them may vary, there is
            one common theme – ensuring the right controls are in place and have been deployed effectively. In the
            first of this two-part series, I’ll focus on the sophisticated attacks, before turning to industrialized and
            opportunistic attacks in the next piece.




            The sophisticated attack cyclone

            Sophisticated attacks are the hardest to remediate, and often have a broader and longer lasting impact.
            The Microsoft email hack in July 2023 is a prime example. It was one of the most tenacious attacks of
            the  last  few  months,  which  ultimately  allowed  the  adversary  access  to  almost  any  email  hosted  on
            Microsoft 365. This included many government and defense departments globally as well as private
            businesses – both large and small.

            In this case, state-sponsored threat actors were responsible, using a mix of exceptional techniques mixed
            with traditional Tactics, Techniques and Procedures (TTPs). To Microsoft’s credit, it was initially open
            about the attack, even   detailing how it occurred, shedding light on multiple points of failure, going back
            as far as 2021. It has since updated this blog, scaling back on its original hypothesis, but still pointing to
            operational issues as the cause.

            The original blog pointed to multiple points of failure – both in the tech and operations – that left the front
            door wide open to the attackers. This was confirmed by a US Department of Homeland Security’s Cyber
            Safety Review Board (CSRB) review of the incident, which was conducted due to the global significance
            of the attack. What remains clear is that there were multiple stages where this devastating attack could’ve
            been interrupted to limit its impact, or even stop it in its tracks.

            But  the  attack  shows  that  nobody  is  immune  to  cybercrime,  and  that  a  determined,  well-resourced
            attacker will compromise even the biggest organizations that pride themselves on their security.



            Sheltering from the storm

            However, even with sophisticated attacks, organizations can take steps to secure themselves by ensuring
            a zero trust strategy. But achieving zero trust is hard, and can be overwhelming when applied to every
            individual, and every single device, application and scrap of data the organization owns. So organizations
            should prioritize the systems that would benefit most from zero trust initiatives first.

            Understanding what resources and which users are critical to the business will allow security teams to
            set realistic goals and outcomes when looking to deploy zero trust initiatives. For instance, zero-trust
            might not be a priority for the machine displaying menu options in the staff canteen. But it will be for
            ensuring privileged users with access to business-critical data can still do their jobs.

            Organizations’ first goal should be to ensure they have the data to fully understand their landscape, how
            users interact with it, and where the greatest risks are. Armed with this they can create measurable
            objectives to roll out a zero-trust strategy, starting where it’s needed the most, showing success and then
            expanding the initiative.




            Cyber Defense eMagazine – June 2024 Edition                                                                                                                                                                                                          145
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   140   141   142   143   144   145   146   147   148   149   150