Page 167 - Cyber Defense eMagazine March 2024
P. 167

This is a big story – not just because it’s Microsoft, but precisely because of the nature of the attack.
            Threat actors love a “simple” hack. Credential stuffing is incredibly easy and presents a massive return
            on investment. Threat actors love legitimate credentials for multiple reasons, including:

               1.  Access - Once I have credentials, I have access to the environment.
               2.  Observation – I can sit quietly in an environment and watch what happens – how does the IT
                   team work? What do your security people monitor for?
               3.  Escalation – Threat actors can profile out a network and deploy further tools to harvest more
                   credentials, deploy malware, or as we saw in the Midnight Blizzard attack, read emails.

            As a threat actor, if all I must do is compromise an account, then I already have what I would normally
            have to expend a lot of effort to gain – legitimate credentials. Once I have legitimate credentials in an
            environment, it’s much easier to monitor traffic and learn what I need to do to mask my activity, making
            it that much harder for defenders to catch me. There’s a reason the cybercriminal ecosystem exists – by
            harvesting credentials and compiling them, threat actors can perpetrate these sorts of attacks and gain
            legitimate access to environments, at which point the ball is in their court and they have control of the
            game.

            So how does all this tie into returning to basics? The important thing about the Microsoft story is not that
            it was Midnight Blizzard – it’s that it was a basic credential stuffing attack against an unprotected account.
            Microsoft is a three-trillion-dollar company – if this happened to them, it certainly could happen to you.
            Credentials are traded by cybercriminal organizations all the time, both on the clear web and the dark
            web. Ensuring you are doing your level best to protect your systems against these sorts of attacks will
            reduce  your  threat  profile  and  make  it  that  much  harder  for  a  threat  actor  to  gain  access  to  your
            environment. Be sure, they will gain access, but if they have to expend additional effort to get into your
            environment rather than a simple credential stuffing attack, that gives you that much more time to detect
            and evict them before they can wreak havoc.

            How do you return to the basics? Take these as action items for your 2024 Back to Basics checklist:

               1.  Use complex, unique passwords. The proliferation of password management software makes
                   generating unique complex passwords for accounts extremely simple. NIST recommendations
                   around password management involve changing passwords only when compromise is suspected,
                   or every 365 days. This puts less pressure on your users to constantly evolve passwords they
                   have  to  memorize  and  gives  you  easier  monitoring  for  your  security  team.  Combined  with
                   password managers, it is relatively easy to drastically improve the security of your passwords
                   beyond using !Spring2024!.
               2.  Use multi-factor authentication. It is 2024, not 2004. Multi-factor authentication being enabled
                   wherever possible is a must, not a maybe. The internet is chock-full of automated attacks just
                   waiting for an unsecured account. Multi-factor authentication comes with its own challenges, but
                   something is better than nothing when it comes to delaying tactics.
               3.  Monitor  strange  activity  on  accounts.  If  you’re  using  complex  passwords  and  multi-factor
                   authentication, then the next step is to monitor for aberrant access. If someone logs in every day
                   from  New  York  City,  and  then suddenly  they  log  in  from  a  foreign country,  that  could  be an
                   indicator of compromise. While not every odd login is malicious, all malicious logins are odd.






            Cyber Defense eMagazine – March 2024 Edition                                                                                                                                                                                                          167
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   162   163   164   165   166   167   168   169   170   171   172