Following the news in the US that millions of Verizon customer records have been exposed in a security lapse. IT security experts commented below.
Jeff Nolan, CMO at SecureAuth:
“This attack is a major wakeup call for organisations to move beyond two-factor authentication which is simply no longer enough to safeguard against today’s attacks. Between SIM card fraud, Signal System 7 (SS7) network intercepts, and NIST’s recent cautions of SMS-based 2FA, there is no question that organisations need to re-evaluate traditional authentication methods. Smart organisations are already moving to adaptive access control techniques, such as with phone number fraud prevention and identity based detection. This works invisibly to the user but protects, detects, and ultimately remediates attacks essentially rendering stolen credentials useless.”
Ermis Sfakiyanudis, Cybersecurity Expert and CEO at Trivalent:
Ryan Wilk, Vice President, Customer Satisfaction at NuData Security:
It’s important to note that these exposures are open vulnerabilities that almost anyone can access. It doesn’t take sophisticated hacking skills to access an unsecuredserver – fraudsters just need to know where to look. Companies that handle personal data need to up their game, not only by being vigilant about server security but also by incorporating the latest technologies to protect their consumer accounts. Advanced techniques like passive biometrics and behavioral analytics identify users by their personal behaviors, which can’t be mimicked by bad actors – even if these leaked but legitimate credentials are presented. The true value lies in the fact that even if consumer information is stolen, it worthless to anyone but the authentic user.”
Itsik Mantin, Director of Security Research at Imperva:
“The flourishing of ransomware is anything but surprising. In the recent years we’ve seen the ransomware economy going through industrialization, allowing attackers to build ransomware campaigns from building blocks they purchase or obtain in darknet forums, with the leading infection vector of 2017 being with no doubt EthernalBlue, which was used in several Ransomware campaigns like WannaCry.
However, with all due respect to the research, I believe the statistics are strongly biased towards noisy attacks and “deprives” other threats like data theft and recruitment of hijacked machines to variety of purposes including cryptomining and joining a botnet. The majority of the data theft attacks go undetected without the victim knowing he was attacked – a fact that holds for both insider and external data breaches. As opposed to data theft, ransomware is a noisy attack, noticed by the victim in 100% of the cases. Thus, even if from the victim’s perspective ransomware is the most prevalent attack, this victim may not know about the five hidden malwares crawling in his organization, collecting and exfiltrating stolen data, collecting credentials and taking over machines. Maybe a few hundred of his desktops might be mining cryptocurrencies for anonymous accounts, or waiting for command to join a DDoS attack on a joint target.”
Sam Elliott, Director of Security Product Management at Bomgar:
Oren Koriat, Information Security Specialist at Cynerio:
We see two disturbing trends with ransomware attacks – one is they are clearly on the rise, and the more nuanced one is that they are not exclusive to user devices anymore and are increasingly infecting servers. This means they evolved to include advanced lateral movement behavior and now pose much greater risk to organizations.
Cryptominers will also continue to trend upwards and pose a new kind of threat to organizations since they’re much less conspicuous.
Mobile malware is appealing to news because everyone owns mobile devices and understands them to some degree, they also contain a lot of personal information that we consider very sensitive. On the flip side, this kind of information is valuable for espionage which happens on a micro scale and not on the scale of large ransomware campaigns for example.
Phishing needs to be handled in a way that sterilizes human error by applying the principle of least privileges on data access. Organizations that hold massive amounts of sensitive information should use solutions that make accessing and moving this data inherently non-trivial.”
Adrian Bisaz, VP of EMEA at CyberProof:
Phishing sustains itself as the number one attack technique, and is so damaging as it is a gateway to whole spectrum of Computer Network Attacks (CNA), Computer Network Exfilteration (CNE), Leaving Logic Bombs, Backdoors, and other malicious activities.
Organizations that think they can build a robust security perimeter by simply meeting industry compliance guidelines are beginning to realize that they are under threat, and the specific nature of ransomware attacks can cause damage way beyond the financials. Organizations that don’t utilize a proactive and multi-layered cyber program, that includes threat intelligence services, awareness programs and capabilities to respond immediately will face potentially devastating consequences of ransomware attacks, both short term interruption to normal business operations and in the long term brand and reputation damage that might result from media exposure that follows such attacks.”
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.