STE WILLIAMS

Why Cyber-Risk Is a C-Suite Issue

Organizations realize the scale of cyber-risk but lack counter-actions to build resilience.

In a global study of more than 2,200 organizations across 22 different countries, NTT Security’s 2019 Risk:Value research found that cyberattacks (43%), data loss or theft (37%), and attacks on critical infrastructure (35%) — aimed particularly at telecoms and energy networks — concern respondents the most. The survey respondents figured these threats would present a greater risk to their organization over the next 12 months than trade barriers and other critical global issues such as the environment, terrorism, and government failures.

Fortunately, corporate awareness of the need for beefed-up cybersecurity is growing. Eighty-four percent and 85% of businesses, respectively, said that strong information security and protecting data integrity were just as important as business continuity, and even more important than revenue growth. Nine in 10 respondents said strong cybersecurity would be a boon for their organization.

Cybersecurity Policies and Incident Response Plans Missing
However, many organizations are having a hard time maintaining even basic levels of security. Only 58% have a formal security policy, but only 48% of those say their employees know what’s in it, meaning that just 28% of companies have security policies that are broadly understood by their employees. They also fall short in incident response planning, which maps out what stakeholders must do in the event of a security incident. Just 52% of the respondents have such a plan. While this is 3% higher than in 2018, only 57% of the respondents from companies with a policy actually know what’s in it. The potential ramifications are clear: If they were hit by a successful cyberattack, the organizations unfamiliar with their own plans would struggle to handle the incident, and, if they managed to muddle through it, would take longer to recover.

Despite Increasing Risks, Security Budgets Remain Flat
In addition to their planning shortfalls, companies are not keeping up with increasing IT dependency and risks. On average, 15% of IT budgets are directed to security, but the share of operations budgets attributed to security has fallen since last year, to 16%. This is troubling, especially since the attack surface has grown exponentially due to the burgeoning Internet of Things (IoT) and connected operational technology (think industry 4.0).

Companies in Germany (14%) and Switzerland (12%) are spending the lowest percentage of their IT budget on security. Spending on security is the lowest in the construction and manufacturing sectors, which allocate 13% of their IT budgets to it. The introduction of potentially devastating threats to the operational infrastructure widely used in the manufacturing sector is deeply troubling in light of the paltry resources being devoted to countering these risks.

One-Third of Companies Would Rather Pay Ransom
One noteworthy finding of the NTT research is the amazing number of companies that are willing to pay ransom. One-third said they’d prefer to hand over ransom to a criminal than invest in cybersecurity. It’s “cheaper,” they said. Such reasoning is both dangerous and naive, since it encourages the bad guys to come back — perhaps with even greater demands than in the first instance.

A similar percentage of respondents said they’d rather pay ransom than be fined for noncompliance, which suggests a fear about the consequences of noncompliance and a lack of confidence in some organizations in their ability to deal with important regulatory issues and to implement a robust incident response plan. This situation is cause for concern because cybercriminals are getting more sophisticated by the day. In fact, cybercrime is undergoing an industrialization wave with large-scale syndicates forming a flourishing underground economy, estimated to produce annual revenues in excess of a staggering $1.5 trillion. Moreover, some nation-states are expanding their cyber warfare capabilities — be it to gather intelligence, sabotage critical infrastructure, or aid their local economy.

The costs of attacks and customer record exposures is hitting the hundreds of millions. Recent examples of such attacks include, among many others, Marriott Hotels’ loss of up 383 million customer records and over 5 million passport numbers, and the exposure of 540 million Facebook customers.

Leaders Think Cybersecurity Is an IT Task
The poor coordination of security measures may be due to subpar or ill-informed senior leadership. The NTT survey revealed that 84% of the respondents said they believe cybersecurity should be a boardroom issue, but only 72% said it actually is a boardroom issue. One in four (23%) said that someone in their organization (such as a CISO) managed day-to-day security in their organization, but only 13% said this person had ultimate responsibility for cybersecurity.

Nearly half (45%) of all respondents — and 57% of C-level respondents — said that cybersecurity is the IT department’s problem. This highlights the alarming gap that often exists between cybersecurity and the C-suite. Apparently, little has changed over the past two years, even though a single successful attack can have significant financial and legal consequences. Smart business leaders need to cultivate a different corporate mindset to winnow out the risks in their organization’s digital strategy.

Conclusion
Cybersecurity is a prime concern for business leaders. Rightly so, as the dependence on IT uptime and resilience has never been greater. However, corporate boards need to move beyond awareness and rhetoric into action in order to reduce the risk exposure of their organization and ensure long-term success.

More rigorous regulatory frameworks and larger fees for violations are boosting awareness of cyber-risk and the need for compliance throughout the organization. But they need to spur an evolution in corporate governance, too. Solutions that might have worked in the analog days (for example, simply putting security under IT) are no longer adequate, particularly when revenues and profits from digital operations and brand reputation are at stake. In the digital era, virtually every board decision will affect the organization’s cyber-risk posture. That’s why cybersecurity should be a recurring item on board agendas and continually reassessed in terms of the broader risk framework. On top of those measures, an incident response and communication plan and regular fire drills are critical. They’re the only way to give the organization a chance to recover quickly after a successful cyberattack.

 

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “Account Fraud Harder to Detect as Criminals Move from Bots to ‘Sweat Shops’

Marc Wilczek is a columnist and recognized thought leader, geared toward helping organizations drive their digital agenda and achieve higher levels of innovation and productivity through technology. Over the past 20 years, he has held various senior leadership roles across … View Full Bio

Article source: https://www.darkreading.com/risk/why-cyber-risk-is-a-c-suite-issue/a/d-id/1336260?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

ASP.NET hosting provider recovering from ransomware attack

SmarterASP.NET – a provider that hosts Microsoft’s ASP.NET open-source web framework and reportedly has more than 440,000 customers – suffered a ransomware attack on Saturday.

SmarterASP.NET was blunt in a status update on Monday titled:

Your hosting accounts are under attack

This wasn’t a partial paralysis. The provider advised customers that all data had been encrypted and that it was working with security experts to try to decrypt it, as well as making sure that “this would never happen again.”

Please don’t email us, the company asked, saying that it was (understandably!) being flooded by emails and that it doesn’t employ enough people to answer them all. It directed customers to its Facebook page for updates.

As of Monday morning, the provider said that it had fully restored FTP and control panel services – though, going by comments on its Facebook post, it sounds like the company’s stressed-out servers were still giving off a miasma of 503 Service Unavailable error messages.

In that post, the company warned customers not to download encrypted files. “If you still see encrypted files, we will get to it soon,” SmarterASP.NET said. The malware encrypted customers’ web hosting accounts, from which they access servers that may contain the files and data they need to run their sites. Thus, it’s not just the SmarterASP.NET customers that lost all their data: it’s also their websites that were affected.

SmarterASP.NET’s website was also temporarily knocked offline by the attack, but it was reportedly back online as of Sunday morning.

OK, said one commenter, all my files have extension .kjhbx… are they still encrypted?

The answer, at least at that point, was yes. The extension is the fingerprint of this particular flavor of ransomware. SmarterASP.net got hit with what ZDNet identified as a variant of the Snatch ransomware. The variant encrypts files with a .kjhbx file extension, as shown by screenshots shared on Twitter, one of which is of the extortionist’s note, the other of which shows a list of encrypted files.

On Monday, two hours after the company posted its Facebook message about its restored control and FTP services, it posted a status update saying that it was 95% back up, with some affected accounts still being decrypted. The ransomware-flustered company begged customers to please hold tight:

They WILL BE decrypted so don’t worry. Please don’t submit requests here.

How to protect yourself from ransomware

  • Pick strong passwords. And don’t re-use passwords, ever.
  • Make regular backups. They could be your last line of defense against a six-figure ransom demand. Be sure to keep them offsite where attackers can’t find them.
  • Patch early, patch often. Ransomware like WannaCry and NotPetya relied on unpatched vulnerabilities to spread around the globe.
  • Lock down RDP. Criminal gangs exploit weak RDP credentials to launch targeted ransomware attacks. Turn off RDP if you don’t need it, and use rate limiting, 2FA or a VPN if you do.
  • Use anti-ransomware protection. Sophos Intercept X and XG Firewall are designed to work hand in hand to combat ransomware and its effects. Individuals can protect themselves with Sophos Home.

Can you be hit by someone else’s ransomware?

(Watch directly on YouTube if the video won’t play here.)

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/7gm-ObQypLU/

OpenText to Buy Carbonite for $800M Cash in $1.42B Deal

The acquisition was confirmed just six months after Carbonite bought Webroot.

Canadian enterprise information management software company OpenText will buy cloud backup and recovery firm Carbonite, the companies announced today.

OpenText will buy Carbonite for “nearly $800 million in cash,” reports Reuters, and the acquisition is valued at about $1.42 billion including debt. The deal is expected to close within 90 days.

The acquisition happens just nine months after Carbonite itself closed on an acquisition of endpoint security and threat intelligence company Webroot for $618.5 million.  

The acquisition of Carbonite “will further strengthen OpenText as a leader in cloud platforms, complete end-point security and protection, and will open a new route to connect with customers, through Carbonite’s marquee SMB/prosumer channel and products,” said Mark J. Barrenechea, CEO and CTO of OpenText, in a statement, via BizJournals

For more, see here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/cloud/opentext-to-buy-carbonite-for-$800m-cash-in-$142b-deal/d/d-id/1336326?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Back-2-school hacking: Kaspersky blames pesky script kiddies for rash of DDoS cyber hooliganism

Kasperksy researchers have blamed pesky schoolkids for the big September spike in denial-of-service attacks.

They found that more than half of DDoS attacks in the third quarter happen in the month of September. Overall attacks were up just over 30 per cent compared to the second quarter and increased by a similar amount compared to the same period last year.

But unlike other periods, the growth is mostly down to quite simple methods rather than an increase in smart, application-based attacks. That and the targeting of mainly education sites – 60 per cent of stopped attacks were against either schools, universities or electronic journals – led Kaspersky to believe that students are to blame for the uptick.

The Russian security firm said: “We observed a similar picture last year, since it is due to students returning to school and university. Most of these attacks are acts of cyber hooliganism carried out by amateurs, most likely with no expectation of financial gain.”

Alexey Kiselev, biz dev manager on the Kaspersky DDoS Protection team, said: “Despite this spell of seasonal activity from young hooligans, who appear to celebrate the beginning of the school year with a spike in DDoS attacks, the more professional market of DDoS attacks is rather stable. We have not seen an explosive increase in the number of smart attacks.”

Kiselev noted that, whomever was responsible, DDoS attacks can still cause serious and expensive headaches for businesses and other organisations.

Researchers found there is still a substantial role played by DDoS-for-hire websites. Despite efforts by the FBI to take them down, new sites have sprung up in their place.

Kaspersky believes the multiple attacks on World of Warcraft Classic servers in early September was run via automated DDoS-as-a-service websites and that the person arrested for the attacks was likely just a client of such a site rather than a skilled hacker.

Researchers have also noted a geographic shift of DDoS attacks with developing countries playing an increasing role as smartphones and broadband routers become more common. At the same time, cybersecurity awareness continues to increase and better use of defences at provider level in countries where cybercrims have been active for a long time pushes attackers to look for easier pickings. These two factors pushed South Africa into the top 10 ranking for the first time in fourth place behind China, the US and Hong Kong.

In the fourth quarter the security firm expects to see growth in total numbers of attacks, length of attack but also in the number of smart attacks. This will be fuelled by criminals looking to exploit increased commercial activity around Christmas but it expects growth to be fairly moderate as the DDoS market stabilises.

Kaspersky collects data from intercepts from command-and-control servers sent to bots to make its analysis and predictions. ®

Sponsored:
How to get more from MicroStrategy by optimising your data stack

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2019/11/11/kids_blamed_for_ddos_spike_in_september/

BlueKeep freakout had little to no impact on patching, say experts

The flurry of reports in recent weeks of in-the-wild exploits for the Windows RDP ‘BlueKeep’ security flaw had little impact among those responsible for patching, it seems.

This according to researchers with the SANS Institute, who have been tracking the rate of patching for the high-profile vulnerability over the last several months and, via Shodan, monitoring the number of internet-facing machines that have the remote desktop flaw exposed.

First disclosed in May of this year, BlueKeep (CVE-2019-0708) describes a bug in the Windows Remote Desktop Protocol that allows an attacker to gain remote code execution without any user interaction. Microsoft has had a patch out for the bug since it was first disclosed.

Over the last week or so, reports came that researchers were spotting active exploits for BlueKeep being lobbed at their ‘honeypot’ systems. These attacks were found to be attempts by hackers to infect machines with cryptocoin-mining software and lead to a series of media reports urging users to patch their machines now that BlueKeep exploits had arrived in earnest.

According to SANS, those reports did not do much to get people motivated. The security institute says that the rate of BlueKeep-vulnerable boxes it tracks on Shodan has been on a pretty steady downward slope since May, and the media’s rush to sound alarms over active attacks did not change that.

Smashing a window with your fist

With more hints dropped online on how to exploit BlueKeep, you’ve patched that Windows RDP flaw, right?

READ MORE

“The percentage of vulnerable systems seems to be falling more or less steadily for the last couple of months,”noted SANS researchers Jan Kopriva and Alef Nula, “and it appears that media coverage of the recent campaign didn’t do much to help it.”

That doesn’t however, mean that there is no threat of a BlueKeep malware outbreak. While the SANS duo say that BlueKeep machines are decreasing in number, there are still more than enough exposed boxes to make for an attractive exploit target.

“Since there still appear to be hundreds of thousands of vulnerable systems out there,” they point out, “we have to hope that the worm everyone expects doesn’t arrive any time soon.”

Fortunately, this week will be a good time for users and admins to get themselves caught up on patches for BlueKeep and other security fixes that have been posted over the Summer by Microsoft.

With the November edition of Patch Tuesday slated to land tomorrow, users can fire up Software Update and get that and previous security fixes to make sure they are protected from all of the known vulnerabilities. ®

Sponsored:
How to get more from MicroStrategy by optimising your data stack

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2019/11/11/bluekeep_didnt_boost_patching/

Learn the Latest Exploit Techniques at Black Hat Europe

Master new exploit techniques for Microsoft RDP, Java remote protocols at Black Hat Europe in London next month.

We’re less than a month away from Black Hat Europe’s return to London, and when this premier cybersecurity event kicks off at The Excel attendees can look forward to a slew of cutting-edge Briefings on the art and inside workings of exploit development.

Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit is a great example. In this 50-minute Briefing, a group of security experts will walk you through their adventures in applying coverage-based fuzzing to Microsoft’s RDP (Remote Desktop Protocol) client — specifically, virtual channels in RDP.

In addition to sharing the construction of the fuzzer and demonstrating the exploitation, the experts will also discuss the heap memory management technique (RDP Heap Feng Shui) which is a prerequisite for exploiting heap overflow vulnerability in the RDP client.

If Java is more your speed check out Far Sides of Java Remote Protocols, which promises to guide you through Java Remote Method Invocation (RMI) and Common Object Request Broker Architecture (CORBA) while revealing several critical flaws under the hood. You will also learn how vendors are failing at securing their implementations.

In Doors of Durin: The Veiled Gate to Siemens S7 Silicon you’ll see how the Siemens S7-1200 PLC bootloader has a “special access feature” that can be exploited to attack Siemens’ S7 PLC series, which is widely used — especially for industrial automation. On a positive note, once discovered by the asset owner, this feature can also be used for good, e.g., as a forensic interface for Siemens PLCs. This talk will be accompanied by a demo of researchers’ findings. Don’t miss it!

Get more information on these and lots of other cutting-edge content in the Briefings schedule for Black Hat Europe, which returns to The Excel in London December 2-5, 2019. For more information on what’s happening at the event and how to register, check out the Black Hat website.

Article source: https://www.darkreading.com/black-hat/learn-the-latest-exploit-techniques-at-black-hat-europe/d/d-id/1336321?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Joker’s Stash Puts $130M Price Tag on Credit Card Database

A new analysis advises security teams on what they should know about the underground payment card seller.

Payment card data is among the most widely distributed information on the Dark Web. The breadth of data for sale in underground marketplaces can prove helpful to security teams, who can analyze this information and combine it with other threat data to learn their potential exposure and mitigate the impact of an incident, Flashpoint researchers advise in a new report.

The ecosystem for stolen payment card data ranges from low-level markets selling cards recycled from past breaches, to top-tier sellers with unused card data directly pulled from a new breach. Joker’s Stash is one of the most prominent payment card retailers on the Dark Web, where it has been selling credit cards from online and physical transactions since 2014. In 2015, it began to also sell personally identifiable information including Social Security numbers.

A recent update on Joker’s Stash arrived on Oct. 29, when it added data pertaining to more than 1.3 million credit and debit cards reportedly taken from banking customers in India. The data dump released was one of the largest in Joker’s Stash’s history, researchers report, with pricing information valued at $100 per card, which put the total for the database at $131 million.

Joker’s Stash and similar marketplaces provide value beyond cybercrime, researchers say. Fraud teams can leverage its data to learn what card data is for sale and the timing of its availability on Joker’s Stash. This reveals the common point of purchase (CPP) of compromised cards and can help identify the geographical source of a breach and stem its potential impact, they explain.

Read more details here.

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “What a Security Products Blacklist Means for End Users and Integrators.”

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/jokers-stash-puts-$130m-price-tag-on-credit-card-database/d/d-id/1336323?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Account Fraud Harder to Detect as Criminals Move from Bots to ‘Sweat Shops’

Cheap labor, frequent data breaches, and better fraud detection technology are fueling frustrating changes in attackers’ methods.

Fraud has changed. As tools to detect and mitigate bot-generated attacks have evolved and improved, criminals are employing cheap human labor to steal account credentials and money. And the economies of several developing nations is making that possible.

(image by rms164)

“It’s cost economics,” says Kevin Gosschalk, CEO of Arkose Labs. “Creating fake accounts for referral fraud used to be more cost-effective. But now we have so many more data breaches happening,” which means that the cyber black market is flooded with legitimate account credentials available to criminals at affordable prices. “Five years ago that was not a thing.”

This means criminals are now employing an almost “sweat shop” style of labor, says Gosschalk, hiring workers in locations like Venezuela, where the hourly wage is so low that it now makes economic sense to pay people to manually carry out fraud with stolen account data, instead of using bots, he says. 

“[Attackers are] giving people a script and saying ‘here’s [the] quota you have to hit,'” says Gosschalk. “Criminals are always trying to figure out what is [the] lowest-hanging fruit. As merchants and companies evolve with defenses, these attackers evolve. Humans just happen to have become the flavor of month.”

Now “human-driven” attacks are increasing quickly. Arkose’s most recent fraud report, covering Q3 2019, found that attacks carried out directly by humans—both lone perpetrators and organized groups—increased 33 percent over the previous quarter. Nearly one in every five fraud attacks were were manual rather than automated.

“The goal is to look as legitimate as possible,” says Vanita Pandey, VP of Strategy at Arkose Labs. “Having humans involved does increase your chance of success. It looks more natural.”

Pandey also notes the increase in this hands-on style of fraud highlights why businesses need to rethink the role of friction within their authentication strategy.

The quarterly report looks at over 1.3 billion transactions spanning account registrations, logins and payments in the financial services, e-commerce, travel, social media, gaming and entertainment industries. Overall, fraud increased 30 percent in Q3 2019 and bot-driven account registration fraud is up 70 percent as cybercriminals test stolen credentials in advance of the holiday retail season.

But every third attack on financial services is manual, with attacks coming from fraudsters with access to stolen identity information and the latest tools. Over half of attacks that originate from Russia and China are now “human-driven,” says Arkose. And China continues to have the highest number because of the enormous labor pool available, according to the report.

The data also highlights attack incentive for countries across the globe, based on their economy. The higher the incentive, the more resources they are likely to put behind attacks while still preserving ROI. For example, if the value of one nation’s currency is only a fraction of the US dollar, than the incentive of a criminal in that country to defraud an American business is quite high. 

Related content:

 

Joan Goodchild is a veteran journalist, editor, and writer who has been covering security for more than a decade. She has written for several publications and previously served as editor-in-chief for CSO Online. View Full Bio

Article source: https://www.darkreading.com/theedge/account-fraud-harder-to-detect-as-criminals-move-from-bots-to-sweat-shops/b/d-id/1336324?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

OpenText to Buy Carbonite for $800M Cash, in $1.42B Deal

The acquisition was confirmed just six months after Carbonite bought Webroot.

Canadian enterprise information management software company OpenText will buy cloud backup and recovery firm Carbonite, the companies announced today.

OpenText will buy Carbonite for “nearly $800 million in cash,” reports Reuters, and the acquisition is valued at about $1.42 billion including debt. The deal is expected to close within 90 days.

The acquisition happens just nine months after Carbonite itself closed on an acquisition of endpoint security and threat intelligence company Webroot for $618.5 million.  

The acquisition of Carbonite “will further strengthen OpenText as a leader in cloud platforms, complete end-point security and protection, and will open a new route to connect with customers, through Carbonite’s marquee SMB/prosumer channel and products,” said Mark J. Barrenechea, CEO and CTO of OpenText, in a statement, via BizJournals

For more, see here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/cloud/opentext-to-buy-carbonite-for-$800m-cash-in-$142b-deal/d/d-id/1336326?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Researchers Find New Approach to Attacking Cloud Infrastructure

Cloud APIs’ accessibility over the Internet opens a new window for adversaries to gain highly privileged access to cloud assets.

Public cloud infrastructure presents security teams with a new invisible management layer, creating new security challenges that demand better understanding. Many organizations don’t properly understand the cloud identity and access management layer and often fail to secure it.

Such misunderstandings usually lead to dangerous misconfigurations that can drive customer risk; for example, in the case of the recent Capital One breach. Current security practices and controls are not sufficient to mitigate the risk posed by misunderstanding of the public cloud, explain Igal Gofman, XM head of security research, and Yaron Shani, XM senior security researcher.

When Gofman and Shani began to research cloud-focused threats, they realized many popular defense mechanisms focus on specific attack vectors: for example, brute force protections against cloud services and applications like password spray tools or AWS recon tools. Post-breach defense is usually based on different user activities and machine learning algorithms.

“The missing link in this approach is that those mechanisms are usually defensive in nature and usually not predictive,” the researchers explain in an interview with Dark Reading. Traditional protections primarily focus on network, application, and operating system defense, they say.

A new attack vector exists in cloud providers’ application programming interfaces (API), which are accessible through the Internet and give adversaries an opportunity to take advantage and gain highly privileged access to critical assets in the cloud. The people in charge of managing cloud resources are usually members of the DevOps, development, and IT teams, who gain access to APIs using different software development kits and dedicated command line tools.

“Once those account credentials are compromised, gaining access to high-value resources is trivial,” the researchers say. Even if an organization makes a private subnet not open to the Internet, they add, cloud APIs can be easily accessed from the Internet with the right API key. Cloud provider tools—for example, the command-line interface tool (CLI) — save the user’s credentials inside a file, which is typically locally stored on the individual’s workstation.

At this year’s Black Hat Europe, Gofman and Shani plan to demonstrate an alternative new approach to attacking cloud infrastructure in a talk titled “Inside Out — The Cloud Has Never Been So Close.” Their methodology involves using a graph to show permission relationships between different entities, revealing risky choke points that need to be addressed and eliminated. The outcome of this graph, they say, can be used by red and blue teams to gain deeper understanding of permission relationships in cloud environments. After explaining the connections, they’ll show how attackers can abuse features to gain privileges.

Attackers don’t need to be sophisticated to take advantage of public cloud APIs, they say, noting they didn’t find any open-source tools that automate the entire stack of the research.

“In practice, the sophistication required to develop such tools is not high, because basically all the information is publicly available and well-documented by most cloud providers, meaning they document each security feature in great detail and it can serve both the defenders and the adversaries,” Gofman and Shani say. In general, they continue, developing an offensive tool that leverages their attack research would be easier than building a defensive system around it.

In terms of protecting themselves, the first and most important steps companies should follow are best practice guides from cloud providers, the researchers say. Large and complex organizations often have trouble tracking and monitoring permissions in large cloud infrastructures, and evaluating general organizational risk factors, they explain. They suggest constantly monitoring paths attacks can take to high-value cloud resources.  

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “What a Security Products Blacklist Means for End Users and Integrators.”

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full Bio

Article source: https://www.darkreading.com/cloud/researchers-find-new-approach-to-attacking-cloud-infrastructure/d/d-id/1336327?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple