As several outlets are reporting today, Deloitte, a “big four” accounting firm, has confirmed that its internal email systems were breached. It’s believed that the breach may have been ongoing since 2016. IT security experts commented below.
John Gunn, CMO at VASCO Data Security:
William Leichter, VP of Marketing at Virsec Systems:
,
,
Stephen Burke, Founder & CEO at Cyber Risk Aware:
Deloitte, like the other BIG 4 and any consultancy firms are a big third party risk for their clients. The risk is pronounced owing to the data that their clients entrust with them as part of audits, RFP’s and consultancy engagements.
In relation to what appears to be how they got the data, impersonating a highly privileged email administrator having obtained their username and password, highlights very bad practice by the admin team and ultimately by the internal audit and security team who should have spotted this weakness in their controls.
Every company must realise that all highly privileged accounts are the most sought after accounts any cyber-criminal goes after as they literally offer the “keys to the kingdom”.
Why on earth they did not have two factor authentication (2FA) in place for email admin accounts beggars belief – this attack may not have been 100% preventable but with 2FA it would be a lot more difficult to carry out. So if you know it is a crown jewel, you apply more controls such as 2FA and monitor abnormal user behaviour using a SIEM tool where you could see highly privileged accounts being used abnormally and generate an alert.
It is also an interesting development for cyber insurance companies where this is an aggregation of risk and I wonder what claims will arise out of this once the dust settles and the true number of clients affected becomes known.”
Matt Dircks, CEO at Secure Solutions Provider Bomgar:
Companies simply cannot afford to be complacent in the face of these threats. It’s critical that all privileged accounts be secured via multi-factor authentication and strong credential management policies, including frequent rotation of privileged credentials. In addition, companies must employ technology that controls, facilitates, and monitors access to privileged systems and data which can aid significantly in detecting intrusion before serious damages occur. Preliminary reports from Krebs and others indicate these three things were not in place at Deloitte. We can only hope that others in the industry heed the fallout from this and other recent breaches and take the necessary steps to protect their privileged information, their customers, and in some cases their careers.”
Stephan Chenette, Co-Founder and CEO at AttackIQ:
The opinions expressed in this article belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.