Let’s put a name to statistics from the reports and articulate the 5 most critical cybersecurity threats businesses need to be aware of:
#1: Identity-Based Intrusions
Identity fraud is the most commonly reported crime for individuals in Australia and continues to be one of the hottest topics in the cyber-world. Phishing, stolen credentials, and privileged escalation are some of the most commonly thrown-around phrases in the industry. In 2024, Microsoft’s newly branded Entra ID, Okta’s Auth0, and AWS Identity are high, in-demand services that will dominate the identity space for various enterprises in the country. Securing these environments will become the number-one priority for organisations across all verticals.
Many identity-based intrusions take place through social engineering techniques that prompts users to disclose their personal credentials. Threat actors use stolen credentials to obtain unauthorised access to systems and continue escalating privileges and move laterally throughout the network using this compromised account. Using escalated privileges, they will identify highly-sensitive data inside your network and exfiltrate your highly-sensitive information to an external server. Strategies to mitigate these intrusions include robust multi-factor authentication (MFA), strong password management, following least privileged access, and following strong Zero-trust principles.
Read more on the importance of strong identity protection in the report below: https://www.crowdstrike.com/cybersecurity-101/privilege-escalation/
#2: Cloud-conscious attacks
Businesses need to focus on the Cloud, with a 110% increase observed in Cloud-conscious intrusions. Actors are becoming more conscious of the Cloud and use their access to target systems to abuse Cloud services in hopes of achieving their objectives (which is usually data exfiltration or holding target systems at ransom). According to the Crowdstrike report, hacker group SCATTERED SPIDER drove most of the Cloud-conscious attacks (amounting to about 29%). One such attack involved phishing and social engineering tactics to breach target systems, escalating privileges, and exfiltrating data from the Cloud and the organisation’s Active Directory database. SCATTERED SPIDER commonly targeted Microsoft 365 credentials to establish a presence in Microsoft’s Cloud identity solution, Entra ID. Actors will often exploit their access to steal credentials data from various password stores and databases. Cloud is also often used to move to on-premise servers and finally exfiltrate this data to an external Cloud service. Cloud security is the future of well-planned cybersecurity and we need to consistently re-evaluate our Cloud practices to create a safer technology world.
#3: Ransomware hacks
Ransomware is an attack which not only exfiltrates data but can affect the availability of critical business services that can cost a business millions, in addition to the millions of dollars demanded by cyber-criminals in exchange for meeting business demands. Most Australians would be familiar with the case of the Medibank breach, where ransomware group REvil posted 6GB of raw data samples on the dark web. The attack began with a third-party IT provider for Medibank who saved their administrator credentials onto their Internet browser. These credentials were stolen by REvil who authenticated and logged into Medibank’s Virtual Private Network (VPN) and installed a malicious script onto the company’s systems. The IT Security team failed to triage the incident in time and approximately 520GB of data were extracted. REvil demanded $10M in ransom (or $1 for each stolen customer record). The ransom was never paid, and Medibank has been imposed with a civil penalty, amounting to millions of dollars, adding to a long line of existing cases already faced by the firm. Organisations need to prioritise ransomware protection, including regular backups and updates, continuous monitoring of the dark web, using antivirus protection and regularly insuring against their business to avoid future breaches.
#4: Social engineering and e-mail fraud
Phishing and other social engineering frauds continue dominating the cyber-space, disrupting work in various industries, specifically targeting employees through malicious emails and other creative tactics. During a phishing attack, the user will be prompted to click a malicious link or file, revealing various sensitive details such as credentials or payment data, which can be further exploited to install malicious software or extract funds from a user’s account. Education and awareness continue to be a common weak link for modern business. The quality of education and awareness will determine the effectiveness of our cyber defence.
#5: Third-party attacks
Third-party risk management will be an interesting topic throughout all of 2024. Many organisations outsource their ICT to specialists outside their organisation to increase business efficiency and reduce expenses for their company. This also poses a risk. Intrusion actors consistently exploit vendor-client relationships to maximise their attack surface. The key motivation here is to maximise returns by obtaining access to hundreds, if not thousands of organisations. Think of the Crowdstrike outage a little more than a month ago. If a hacker obtains access to Crowdstrike’s Falcon solution, they could theoretically hold the whole world hostage. The world is entering a new era of IT security, and businesses must take calculated risks when establishing business relationships.
Cybersecurity grows in importance and an increased focus towards the Cloud and social engineering attacks highlights a need for significant investment from businesses into their preventive, responsive, and recovery protocols. This article is sponsored by Cylo.ai, an IAG-backed cyber insurance company that helps small-to-medium enterprises (SMEs) insure against the deadly impacts of cyber-attacks. Learn more about Cylo’s products here:
Sources