Ransomware and malicious insiders are on the rise and upper management is showing greater interest in information security – according to a new threat intelligence report from IBM X-Force.
Ransomware like CryptoWall has become one of the top mobile threats, in addition to desktop
threats. It’s been found wrapped into a variety of exploit kits — the Angler EK alone generated $60 million from ransomware — and has been seen spreading through malvertising campaigns.
IBM X-Force, however, states the top infection vector was simply unpatched vulnerabilities. “A well-known infection vector of ransomware can exploit unpatched operating system vulnerabilities to give attackers access to the system resources they want to lock or the data they want to encrypt,” according to the report. After unpatched vulnerabilities, drive-by downloads and spear-phishing, respectively, were the leading attack vectors.
To defend against, recover from, and mitigate the effects of ransomware, X-Force recommends creating and testing back-ups thoroughly; conducting better user training; using “software designed to catch anomalies related to binaries, processes and connections” which “can also help identify many kinds of malware, ransomware included;” and using file recovery software, professional services, or Microsoft Windows Volume Shadow Copy Service to try to recover files that the ransomware has copied/deleted or encrypted.
By “onion-layered incidents” IBM X-Force is not referring at all to onion routing. It is referring to detected security incidents that lead forensic investigators to discover evidence of hitherto undetected attacks.
“Were it not for the disruptive event caused by the script kiddies, the client might never have noticed anything wrong,” the report said.
The common trait in scenarios like this, said researchers, is that the compromised organizations were running old operating system versions that hadn’t been patched in a long time.
Malicious insiders are abusing remote administration tools and organizations are making those attackers’ work easier by following bad password policies, conducting insufficient logging, and failing to revoke employees’ credentials immediately after they leave the company.
“The common thread is that accountability was not enforced. … Knowledge can’t be stripped from an employee leaving an organization, but there are ways to minimize the risk of that knowledge being used for malicious purposes,” the report said.
X-Force found that in the organizations most prone to insider attacks, passwords were “routinely” set to never expire, password sharing between team members was not discouraged, admin accounts were shared, and user credentials were not immediately revoked when an employee was terminated or left the company.
“As a result, ex-employees with ill will toward former employers held powerful weapons they could use to express their resentment. They simply needed a way to get back into the network.”
The most common method, according to IBM: “In most malicious insider attacks we’ve seen, the disgruntled employee typically ‘prepared for departure’ by installing remote administration tools such as LogMeIn or TeamViewer for access to the employer’s network.”
X-Force recommends that security teams that suspect or detect the unauthorized use of remote administration tools block access for the master servers of these tools.
The post Majority of cyber attacks initiated by malicious insiders appeared first on Payments Cards & Mobile.