Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
CISOs should address identity management ‘as fast as they can’ says CrowdStrike exec
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Breakout time, how long it takes for an adversary to start moving laterally across at IT network, reached an all-time low last year. The average fell to 48 minutes, while the fastest breakout time dropped to a mere 51 seconds;Voice phishing (vishing) attacks, where adversaries call victims to amplify their activities with persuasive social engineering techniques, saw explosive growth, up 442% between the first and second halves of 2024.This is part of a trend CrowdStrike sees from commodity malware operators, a shift from phishing to other tactics including callback phishing and help desk social engineering attacks;Attacks related to initial access boomed, accounting for 52% of vulnerabilities observed by CrowdStrike in 2024. Providing access as a service became a thriving business for threat actors, as advertisements for access brokers increased 50% year-over-year;Among nation-states, China-nexus activity surged 150% overall, with some targeted industries suffering 200% to 300% more attacks than the previous year;GenAI played a pivotal role in sophisticated cyberattack campaigns last year. It enabled a North Korean-aligned threat actor dubbed Famous Chollima to create highly convincing fake IT job candidates that infiltrated victim organizations, and it helped China-, Russia-, and Iran-affiliated threat actors conduct AI-driven disinformation and influence operations to disrupt elections.As an example of a malware-free attack, the report outlined tactics used by a threat actor it dubs Curly Spider, which it described as “one of the fastest and most adaptive eCrime adversaries, executing high-speed, hands-on intrusions.”After firing a large volume of spam emails impersonating charities, newsletters, or financial offers to an employee, a gang member calls the target posing as a help desk or IT support member. They claim the spam is caused by malware or outdated spam filters. The employee is told to join a remote session using a tool like Microsoft Quick Assist or TeamViewer (the gang member even helps them download the tool). That lets the attacker into the IT system to download malicious payloads using curl or PowerShell, and to establish persistence through a backdoor. Another common threat actor tactic is calling a targeted organization’s IT help desk pretending to be a legitimate employee, and attempting to persuade support to reset passwords and/or multi-factor authentication (MFA) for an account.

Advice for CISOs: To stop these kinds of attacks, CrowdStrike urges CISOs to require video authentication with government identification for employees who call to request self-service password resets, and to train help desk employees to be cautious when taking password and MFA reset request phone calls made outside of business hours, particularly if an unusually high number of requests is made in a short time frame or if the caller purports to be calling on behalf of a colleague.It also helps to switch to additional, non-push-based authentication such as FIDO2 to prevent account compromise.Meyers also said that, because threat actors are increasingly exploiting unpatched vulnerabilities, CISOs need to change their patch management strategy.Most organizations prioritize patching either by the prevalence of the vulnerability in their IT environment, or by severity using a CVSS criticality score. However, he noted, threat actors these days are chaining low-scoring vulnerabilities that they can use to create a higher criticality vulnerability.”Think about doing your patch management based on what your adversaries are actually exploiting,” Meyers advised CISOs. A vulnerability with a score of 7 may seem high, but not if it’s hard to exploit, he said. On the other hand, a lower severity vulnerability that’s being exploited against your firm’s vertical or geographic region is more important to remediate than others.The full report is available for download. Registration is required.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3836917/cisos-should-address-identity-management-as-fast-as-they-can-says-crowdstrike-exec.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link