Friday, September 25, 2020

Sometimes it’s Best to Avoid “Cupid’s” Arrow

By Alastair Paterson, CEO and Co-Founder, Digital Shadows

Valentine’s Day is fast-approaching and the story goes that if Cupid hits you with his golden arrow you’ll fall madly in love. And who doesn’t want to fall madly in love? But there are other actors taking aim at you on Valentine’s Day whose arrows you need to avoid as the outcomes aren’t nearly as desirable.

Think back to early February 2016, when many online florists experienced a surge in traffic that wasn’t due simply to a rush to buy flowers. Dozens of florists were hit by targeted DDoS attacks during their busiest time of the year, causing problems for some and knocking others offline who were asked to pay a ransom before they could resume operations.

It’s fairly typical for bad actors to escalate extortion-based campaigns during seasonal events when the stakes for targets are high. Looking to profit with minimal investment, attackers exploit known vulnerabilities as they attempt to breach systems. For example, the 2016 Valentine’s Day DDoS attacks used Shellshock, a critical vulnerability that’s present in Linux, UNIX and Mac OS X that had been discovered more than a year earlier.

Of course, online florists are not alone when it comes to being targeted by cyber criminals. Different times of the year and major news events can trigger a surge in attacks aimed at particular industries and geographies. Organizations need to understand their threat model and apply security processes as appropriate. For example, here are 10 things to do to mitigate the risk of extortion-based attacks.

  1. Address vulnerabilities. Patching and proper configuration is an important part of your defense strategy. Failing to patch and misconfiguration opens the door wide for adversaries. Gaining awareness of the most commonly exploited vulnerabilities helps to prioritize patching and reconfiguration procedures.
  1. Educate users. Provide awareness and training on the threat of extortion-based attacks, how they may be delivered, how to avoid becoming a victim, and how to report suspected phishing attempts. This training also should include the risks associated with password reuse.
  1. Regularly backup data. Use cloud-based or physical backups and verify their integrity. Ensure that backups are remote from the main corporate network and machines they are backing up.
  1. Separate data. Categorize data based on organizational value and then physical or logical separation of networks can be created for different business functions.
  1. Manage the use of privileged accounts. Ensure the principal of least privilege is implemented not just for data but also for file, directory and network share permissions.
  1. Manage passwords. Implement an enterprise password management solution – not only for secure storage and sharing but also strong password creation and diversity. Ensure that you have an emergency password reset process in place. Make sure that all of the users’ accounts are included, not just Microsoft Active Directory accounts.
  1. Authenticate users. Implement multi-factor authentication for external facing corporate services like Microsoft Outlook Web Access, and Secure Sockets Layer Virtual Private Networks, as well as for software-as-a-service offerings like Google Applications, Office365 and Salesforce.
  1. Develop a response playbook. Developing a response playbook in the midst of an attack that has taken your critical services offline is a less than ideal situation. Establish internal processes for mitigation, recovery and external communication. Be proactive so that you can fully vet the playbook with all affected stakeholders.
  1. Build out your threat model. Understand the threat actors targeting your industry and geography and monitor which tools they are using. This will allow you to prioritize security spending based on threats specific to you and keep abreast of their latest tactics, techniques and procedures (TTPs).
  1. Prioritize the services that must be available and confirm executive buy-in for protection/mitigations. Gain this buy-in by communicating the losses incurred for downtime. How much will one hour of downtime cost you? How does that line up against the cost of protection?

Threat actors will continue to take advantage of events to launch attacks, but you can avoid their arrows this Valentine’s Day. By being aware of how their methods are evolving and your digital risk, you can take steps to proactively protect your data, infrastructure, employees and customers.

MOST READ

The National Medical Taskforce for Combating the Coronavirus (COVID-19) provided an update on the COVID-19 response in the Kingdom

The National Medical Taskforce for Combating the Coronavirus (COVID-19) today held a press conference at the Crown Prince Centre for Training and Medical Research...

Loan payment deference to help citizens, SMEs

The banks’ response to defer loan payments until the end of the year is a continuation of the initiatives in the financial and economic...

stc Bahrain, the first telecom operator in Bahrain to offer Roadside Assistance and Home Assistance services

stc Bahrain, a world-class digital enabler, is the first telecom operator in Bahrain to venture into Roadside Assistance and Home Assistance services, expanding its...

The aftermath of a historic night for BRAVE CF and Arab MMA

BRAVE Combat Federation’s vision of globalizing the sport started within the Arab world, which was often overseen by many other organizations, and to provide...

BD 150,000 ‘Shop & Win’ anniversary bonanza

Lulu Hypermarket is celebrating its 13th anniversary of being a retail leader in the Kingdom of Bahrain with a grand ‘Shop and Win’ e-raffle...

Adherence to precautionary measures national responsibility

President of the Supreme Council of Health and Chairman of the National Medical Taskforce for Combating Coronavirus (COVID-19) Lieutenant-General Dr. Shaikh Mohammed bin Abdulla...

HM King addresses United Nations General Assembly

His Majesty King Hamad bin Isa Al Khalifa has delivered Bahrain’s address to the 75th session of the United Nations General Assembly in New...

Education Minister participates in virtual meeting

Minister of Education Dr. Majid bin Ali Al Nuaimi participated in the Arab Education Ministers meeting on endorsing the document of developing education in...

Health Ministry: target of 6000 volunteers reached

A total of 6000 people hailing from different nationalities have volunteered for the phase III COVID-19 vaccine clinical trials. The Ministry of Health has announced...

GLOMAT – The First Thai-Bahrain Hybrid Virtual Business Meeting

The Royal Thai Embassy, in cooperation with the Office of SMEs Promotion (OSMEP) Thailand, Institution of Small and Medium Enterprises Development of Thailand and...

BRAVE CF 42 full fight card released with 12 nations represented and the Flyweight Tournament quarter-finals

BRAVE Combat Federation returns to the Kingdom of Bahrain, for the second consecutive week with BRAVE CF 42, on September 24th. The promotion released the full...

Health Minister urges compliance to reduce COVID-19 infections

Health Minister Faeqa bint Said Al-Saleh urged full compliance with the mandatory precautionary measures to curb the spread of the novel coronavirus (COVID-19). She called...

KHK MMA dominates at BRAVE CF 41 with four huge victories

BRAVE Combat Federation hosted the first of three groundbreaking events last Thursday in the Kingdom of Bahrain, with seven bouts taking place behind closed...

Batelco Launches Unlimited Business Mobile Packages

Batelco has unveiled its latest business mobile packages in a complete refresh of its existing packages, targeted at business customers including entrepreneurs, SMEs and...

SCE launches training course for radiological and nuclear emergencies

The Supreme Council for Environment (SCE)’s CEO Dr. Mohammed Mubarak bin Dainah, launched the national training course on responding to radiological and nuclear emergencies. The...