Cyber hygiene is vital to survive today’s attacks, says Microsoft report

Share post:

There are no shortcuts to fighting human-directed ransomware, according to Microsoft’s latest Digital Defence Report.

“Combating and preventing attacks of this nature requires a shift in an organization’s mindset to focus on the comprehensive protection required to slow and stop attackers before they can move from the pre-ransomware phase to the ransomware deployment phase,” says the report, which was issued today.

“Enterprises must apply security best practices consistently and aggressively to their networks, with the goal of mitigating classes of attacks. Due to human decision-making, these ransomware attacks can generate multiple, seemingly disparate security product alerts which can easily get lost or not responded to in time.

“Alert fatigue is real, and security operations centers (SOCs) can make their lives easier by looking at trends in their alerts or grouping alerts into incidents so they can see the bigger picture. SOCs can then mitigate alerts using hardening capabilities like attack surface reduction rules.

“Hardening against common threats can not only reduce alert volume, but also stop many attackers before they get access to networks.”

The report urges CISOs and infosec leaders to

  • build credential hygiene. More so than malware, attackers need credentials to succeed in their operations. The successful human-operated ransomware infection of an entire organization relies on access to a highly privileged account like a Domain Administrator, or the ability to edit a Group Policy;
  • audit credential exposure;
  • prioritize the deployment of Active Directory updates;
  • prioritize cloud hardening;
  • reduce the attack surface;
  • harden internet-facing assets and understand your perimeter;
  • reduce SOC alert fatigue by hardening your network to reduce volume and preserve bandwidth for high-priority incidents.

Ninety-eight per cent of cyber attacks can be thwarted by basic hygiene, the report stresses, including the adoption of multifactor authentication, a zero-trust security architecture, patching critical applications fast, and protecting data.

The 114-page report notes that while Russia drove headlines with its hybrid online and physical war against Ukraine, Iranian actors escalated their attacks following a transition of presidential power, launching destructive attacks targeting Israel, and ransomware and hack-and-leak operations targeting critical infrastructure in the United States. China also increased its espionage efforts in Southeast Asia and elsewhere in the global south, the report says, seeking to counter U.S. influence and steal critical data and information.

Meanwhile, cybercriminals are becoming more frugal. The proof: To lower their overhead and boost the appearance of legitimacy, the report says, attackers are compromising business networks and devices to host phishing campaigns, malware, or even use their computing power to mine cryptocurrency.

In addition, the report notes that threat actors are increasingly targeting Internet of Things (IoT) devices or Operational Technology (OT) control devices as entry points to networks and critical infrastructure.

One important conclusion in the report: Cybersecurity hygiene is more important than ever because threat actors are rapidly exploiting unpatched vulnerabilities, are using both sophisticated and brute force techniques to steal credentials, and are obfuscating their operations by using open-source or legitimate software.

The report is filled with nuggets of information gleaned from Microsoft products and its security response teams.

For example, the top three contributing factors in ransomware attacks that Microsoft was called in for this year were: insufficient controls preventing access to privileged accounts and/or stopping lateral movement in 96 per cent of incidents; limited adoption of modern security frameworks (87 per cent of incidents); and insecure configurations of the identity provider (86 per cent).

Eighty-eight per cent of impacted ransomware customers did not employ Active Directory and Azure AD security best practices. “This has become a common attack vector as attackers exploit misconfigurations and weaker security postures in critical identity systems to gain broader access and impact to businesses,” the report notes.

Similarly, in 88 per cent of ransomware incidents, multifactor authentication was not implemented for sensitive and high privileged accounts.

None of the impacted organizations implemented proper administrative credential segregation and least privilege access principles via dedicated workstations during the management of their critical identity and high-value assets, such as proprietary systems and business-critical applications, the report adds.

Sixty-eight per cent of organizations impacted by ransomware did not have an effective vulnerability and patch management process. A high dependence on manual processes for patching led to critical openings, the report says. Manufacturing and critical infrastructure continue to struggle with maintenance and patching of legacy operational technology (OT) systems, it adds.

As other cybersecurity companies have reported, Microsoft, too, has seen a drop this year  in Canada and the U.S. in ransomware reports. One possibility, this report says, is that in the face of more active law enforcement activity, groups are looking to other countries to attack. Tension between Russia and the United States over Russia’s invasion of Ukraine appears to have put an end to Russia’s nascent co-operation in the global fight against ransomware, Microsoft adds.

Separately, the report notes a rise in targeted attacks that specifically avoid password-based authentication to reduce the chance of detection. These attacks leverage browser single sign-on (SSO) cookies or refresh tokens obtained via malware, phishing, and other methods, the report says. In some cases, attackers choose infrastructure in locations near the geographic location of the targeted user to further reduce the chances of detection.

“We have seen a steady rise in token replay attacks, reaching over 40,000 detections per month in Azure AD Identity Protection. Token replay is the use of tokens that were issued to a legitimate user by an attacker that has possession of said tokens. Tokens are commonly obtained via malware, for example by exfiltrating the cookies from the user’s browser or through advanced phishing methods.”

The post Cyber hygiene is vital to survive today’s attacks, says Microsoft report first appeared on IT World Canada.

Howard Solomon
Howard Solomonhttps://www.itworldcanada.com
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, April 24, 2024 – Good news/bad news in Mandiant report, UnitedHealth admits paying a ransomware gang, and more

This episode reports on the danger of using expired open-source packages, a tool used by a Russian hacking group and passw

Google Play introduces new biometric verification with a user warning

Google has recently announced updates to the biometric verification process for Google Play purchases, aiming to bolster security...

Cyber Security Today, Week in Review for week ending Friday April 19, 2024

On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT d

Cyber Security Today, April 19, 2024 – Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more

This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways