11/05/2024 | News release | Distributed by Public on 11/05/2024 08:17
With attackers moving at greater speed and scale than ever before, the fundamentals of cybersecurity have become even more important. Unit 42 has gathered data from hundreds of incidents across the globe to identify the soft spots in security postures that made cyberattacks in 2023 more risky and painful than they needed to be.
Effective patch and vulnerability management, complete visibility and comprehensive identity management practices often feel out of reach. Our 2024 Incident Response report reveals the need for defenders to prioritize these security fundamentals more than ever.
Ineffective Patch and Vulnerability Management
Software and API vulnerabilities are a prime target for bad actors. According to the Unit 42 Incident Response Report, 38% of breaches exploited these flaws last year, dethroning phishing and social engineering as the top attack vector for the previous two years.
Vulnerabilities in software, like the MOVEit file sharing service, allowed attackers to mount large-scale intrusion campaigns. We found that over 85% of organizations had Remote Desktop Protocol internet-accessible for at least 25% of a month, significantly increasing the risk of a ransomware attack.
Organizations must get their arms around their internet-facing attack surface, which is more easily said than done.
While vulnerabilities themselves are inevitable, your organization's response is not. Establishing a system for vulnerability awareness and remediation is critical for good security hygiene. This system starts with a complete and maintained inventory of assets, coupled with ongoing monitoring of CVE databases.
However, discovering all the vulnerabilities in your purview isn't enough. Teams need processes and tools that allow them to score and prioritize the vulnerabilities that present the most risk. Other controls that hinder attackers, like segmenting systems and subnets, can make some vulnerabilities less critical by imposing speed bumps and dead ends on attackers' progress.
Gaps in Monitoring and Coverage
Organizations with partial or incomplete deployment of security controls allowed attackers to operate from parts of the network that weren't defended. Imagine a fortified castle with shadowy corners that are never patrolled; that's the risk of partial security control deployment.
The modern IT landscape is only growing in complexity. Organizations juggle a mix of on-premises infrastructure, cloud deployments, hybrid environments and even multicloud architectures. This diversity makes consistent eXtended detection and response (XDR) deployment across all endpoints a challenge. This challenge is compounded by the sheer variety of devices (desktops, laptops, mobile devices and even IoT products) connecting to the network.
This complexity is further amplified in bring-your-own-device (BYOD) situations, where endpoints regularly move inside and outside the corporate network. Additionally, integrating XDR tools with existing security infrastructure (i.e., firewalls, security information and event management (SIEM) systems, and other endpoint solutions) can be difficult, creating gaps in overall coverage. Achieving full coverage often requires a complex tool stack, leading to increased costs, redundancy and a greater maintenance burden.
Fortunately, organizations can consolidate tools into unified security platforms, like extended security intelligence and automation management (XSIAM) solutions. These platforms offer a centralized view of security events across the entire network, simplifying management and reducing tool sprawl.
Leveraging strong relationships with those who can help you defend is vital to success. These partners can identify potential uncertainties through tailor-made strategies and services, like vulnerability scanning, to ensure comprehensive security coverage across the entire IT environment. By adopting these strategies, organizations can move from a partially secured castle to a fully fortified stronghold.
Overprivileged Identity and Access Management
Credential theft is still rising, accounting for 20% of attacks last year, which is up 4% from 2021 and 13% from 2022. With privileged credentials in hand, attackers can penetrate systems, move laterally and escalate privileges to reach more sensitive assets.
Identity is a fundamental of strong security - knowing who's doing what, and whether they should be doing it.
Fortifying defenses against credential-based attacks goes beyond implementing multifactor authentication (MFA) and other table-stakes controls. Teams must cultivate the ability to stitch together data points from disparate sources, painting a bigger picture of behavior that may indicate an attack pattern. As it stands, security teams universally struggle with the sheer volume of data generated by their tools, and they cannot analyze audit logs and maintain correlation rules.
Though forensics following a breach may suggest these patterns are obvious, that's simply not the case.
A tension between security and productivity prevents security teams from effectively leveraging this data. Personnel are commonly granted excessive privileges for the sake of convenience and productivity. However, they don't always have a deeper security training to safeguard these privileges, which can create low-hanging fruit for attackers.
To effectively combat these challenges, organizations can deploy a streamlined detection strategy focused on identifying unusual activity within their systems:
Organizations can significantly bolster their defenses against credential theft and social engineering attacks by implementing vigilant detection strategies, strong authentication protocols and robust identity and access management (IAM) practices.
Get the Right Tools for the Job
Palo Alto Networks offerings can empower your organization to address key security challenges and bad security hygiene:
Patch and Vulnerability Management:
Consistent Security Coverage:
Identity and Access Management:
Attackers are moving with greater speed, scale and sophistication than ever. Modern tools can only help you so much without progressive security mindsets and frameworks that are built and maintained to guard you against today's attacks. A Unit 42 Retainer gives your team access to the elite backup they need to stay vigilant and work smarter.
To get a full picture of what our incident response team has observed while responding to real attacks on organizations last year, access the Unit 42 Incident Response Report.