Cyber ​​forensics: Convenience plays into the hands of cybercriminals

Cyber ​​forensics: Convenience plays into the hands of cybercriminals - Image by Mohamed Hassan on Pixabay

Share post

Cyber ​​Forensics: The latest Active Adversary Report from Sophos uncovers an interesting turnaround that addresses a common problem in IT security: convenience. Hard-working attackers exploit this mercilessly.

In previous case data from the report, which analyzes actual cyberattacks, exploiting vulnerabilities was the leading cause of attacks, closely followed by compromised credentials. In the first half of 2023, this picture reverses significantly, and for the first time, compromised access data was the top cause at 50%. The exploitation of a vulnerability was 23%.

Stolen login credentials

While this snapshot cannot comprehensively prove that attackers prefer compromised credentials over vulnerabilities, there is no denying that the use of illegally acquired, valid accounts makes attackers' schemes much easier. What makes compromising credentials even more attractive for cybercriminals is that multifactor authentication (MFA) is still missing or not consistently implemented in many organizations.

During the forensic analysis of the cyberattacks, SophosLabs found that MFA was not fully configured in 39% of the cases examined so far. “The most disheartening thing about this statistic is that as an industry we know how to solve this problem, but too few organizations are prioritizing this area,” said Michael Veit, cybersecurity expert at Sophos. “So the problem is not technology, but enforcement. Often, authentication requirements are relaxed to provide a better user experience. This opens the door for attackers and when it comes to human opponents, these small cracks already offer the best chance of breaking into networks.”

Authentication technologies as a challenge

There is also a constant race in the area of ​​MFA (Multi Factor Authentication). As companies implement stronger authentication mechanisms, criminals respond by developing techniques that circumvent the technologies they use. “This cycle will continue for the foreseeable future,” said Veit. “We are now past the point where simple SMS codes, time-based one-time passwords (TOTP) or even push-bashed authentication are effective. Organizations that want to protect themselves from the latest attack techniques need to move to phishing-resistant MFA. And even here the criminals are not idle. When Sophos

Phishing-resistant MFA technologies bring protection

Modern, phishing-resistant MFA technologies as the standard authentication mode for all services within an organization, including appropriate training, currently ensure maximum protection against compromised login data. The resulting costs must also be measured against the costs of a potential security breach and recovery, which are often many times more expensive. However, strong authentication alone cannot stop every attack, which is why layered defense and telemetry analysis are critical. Both give companies time and opportunity to detect and defend against an active attack.

Additionally, many authentication systems can be configured for adaptive access. This practice changes the access or trust level based on contextual data about the user or device requesting access. Additionally, access is limited to those users who really need it. Adaptive access authentication systems allow organizations to customize access policies for specific applications or user groups and respond dynamically to suspicious signals.

More at Sophos.com

 


About Sophos

More than 100 million users in 150 countries trust Sophos. We offer the best protection against complex IT threats and data loss. Our comprehensive security solutions are easy to deploy, use and manage. They offer the lowest total cost of ownership in the industry. Sophos offers award-winning encryption solutions, security solutions for endpoints, networks, mobile devices, email and the web. In addition, there is support from SophosLabs, our worldwide network of our own analysis centers. The Sophos headquarters are in Boston, USA and Oxford, UK.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more