Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Lessons Learned from Data Breaches and File-names

When it comes to securing our organizations from cyberattack, we can be our own worst enemy. For example, how many users on your network store sensitive information like user names and passwords in files with easy to find labels (passwords.doc)? Unfortunately, it’s likely more than you think. And it takes just one of those users falling victim to even a basic spearphishing attack to allow that information to fall into the hands of an attacker.

When it comes to securing our organizations from cyberattack, we can be our own worst enemy. For example, how many users on your network store sensitive information like user names and passwords in files with easy to find labels (passwords.doc)? Unfortunately, it’s likely more than you think. And it takes just one of those users falling victim to even a basic spearphishing attack to allow that information to fall into the hands of an attacker.

Most of the major data breaches in 2014 had two common traits: spearphishing, which involves the sending of targeted emails to employees, and the compromise of third-party contractors who often have access to company resources. With these tested techniques in hand, attackers relied more on compromising user trust than sophisticated nation-state level malware and zero-day exploits. Lesson learned? It doesn’t take the most advanced tools to break into the even the largest corporations on the planet.

Once an attacker establishes an initial foothold, he moves on to additional steps in the attack kill-chain, usually attempting to steal legitimate credentials from a privileged user. Once obtained, they can masquerade as an Admin, moving more easily through the network. Often this can involve an exhaustive search and multiple advanced tools, but sometimes attackers find an unencrypted file that obviously contains sensitive data. Even if these files don’t include login details for a privileged machine, they represent a hundred new attack vectors and ways to maintain access within a compromised network. They could be credentials to internal systems, accounts for third-party services, personal information, etc.

Human behavior being what it is, we will often re-use passwords across multiple services. Lesson learned? Don’t store passwords on your machine, especially not in plaintext. There are a number of secure password management applications available to help manage your credentials.

The above attack flow assumes that a user has been somehow tricked into clicking a malicious link in a spearphishing email, or visits a compromised site with a vulnerable browser. But the attacks also occur when a user mistakenly opens malicious content.

To illustrate, below are real malicious filenames found on enterprise networks:

• “please call me back asap.exe”

• “Copy_of_document_July-31-2014.exe”

Advertisement. Scroll to continue reading.

• “DeltaTicket.exe”

• “Financial_report.rar.scr”

Looking through hundreds of thousands of suspect files, a few simple trends emerged. First, users do not look at file extensions. Logic would dictate that a supposed copy of a document, or an airline e-ticket would never be an executable.

Executables are an incredibly simple way of delivering malware wrapped up and ready to infect systems. Attackers know this behavior and will craft malware that looks like a PDF, often even including “.PDF” in the filename, when it is really something else. You can’t rely on users to know to not download executables from the internet, or open them in an email, especially when personal webmail is allowed on corporate networks.

The second largest trend is the same exploitation of trust we saw earlier: attackers attempting to blend into common business practices to deliver malware. Yes, there are instances of obviously inappropriate workplace actions, such as employees downloading pornographic files, pirated software, games, or movies – but these make up a relatively small portion of the overall files analyzed. Far more common were faked scanned documents; court notices, an invoice, or travel arrangements. These are all emails or files people would not think twice about opening.

Between user behavior and the types of malicious files attempting to compromise enterprises, there are a few steps you can take to reduce your risk exposure today:

• Educate your users on how to properly store credentials, including using password management tools, never storing them in plaintext, and of course enforcing good policy for all internal systems.

• Use a security solution that can block the download of all Executables from the Internet. This is an incredibly simple way to cut down on 90 percent or more of all malware delivered to your employees, as we saw in the types of malware above. Typically there is limited legitimate use of an .EXE from a website.

• Automate the prevention of threats to take the burden off your users, and security teams. There will always be new malware, and new methods of compromise. User training and remediation can never keep up with the threat landscape as it evolves.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Funding/M&A

The private equity firm merges the newly acquired ForgeRock with Ping Identity, combining two of the biggest names in enterprise IAM market.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...