27.09.2021 Views

CM October 2021

The CICM MAGAZINE FOR CONSUMER AND COMMERCIAL CREDIT PROFESSIONALS

The CICM MAGAZINE FOR CONSUMER AND COMMERCIAL CREDIT PROFESSIONALS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

INSIGHT<br />

AUTHOR – Leanne Salisbury<br />

Leanne Salisbury<br />

By masquerading<br />

as a trusted entity,<br />

the threat actor can<br />

create a sense of<br />

authority and play on<br />

the fear of people as<br />

they look for security<br />

and assurance from<br />

trusted institutions.<br />

Pre-pandemic awareness of phishing<br />

(targeting via email), vishing (targeting via<br />

voice call) and smishing (targeting via SMS<br />

text messaging) was already on the rise, and<br />

many companies were already providing<br />

security awareness training on the subject<br />

for employees. However, the fear around<br />

COVID-19 allowed criminals to ramp up<br />

exploitations and take advantage in cases<br />

where perhaps previously individuals<br />

would have paused and considered the<br />

email more carefully. Malicious file<br />

attachments containing malware payloads<br />

had COVID-19-related titles and prompted<br />

the receiver opening a file containing<br />

malware. There were also malicious<br />

android apps that claimed to have real-time<br />

trackers but instead aimed to get the user<br />

to provide administrative access to install<br />

"CovidLock" ransomware on their device .<br />

WEBSITE DOMAINS<br />

Some threat actor groups went a step further<br />

and registered new website domain names<br />

containing wording related to COVID-19<br />

or Coronavirus. During a six-week period<br />

in early 2020 the United Nations Office<br />

on Drugs and Crime (UNODC) reported<br />

that as of the end of March 2020, more<br />

than 9,000 domains were registered with the<br />

Coronavirus theme. While some were set<br />

up for legitimate reasons, many presented<br />

information related to the pandemic only as<br />

a lure for malicious purposes. Using these<br />

domains, attackers could bypass the need<br />

to obtain victim email addresses and then<br />

send a phishing email with a malicious<br />

attachment or link. The malicious website<br />

could be used as a mechanism to deliver<br />

malware and obtain credentials through<br />

direct access by the victim landing on<br />

the page.<br />

Video and teaming apps also proved to<br />

be an area of weakness. At the beginning<br />

of the pandemic, the use of thirdparty<br />

videoconferencing and teaming<br />

applications grew exponentially as firms<br />

– and individuals – used them to stay<br />

connected. One of these in particular went<br />

from being largely unknown to becoming<br />

the most widely used app within weeks of<br />

lockdown restrictions being implemented.<br />

However, this popularity surge also made<br />

them a target. A weakness in the application<br />

opened the door for attackers, allowing<br />

them to take control of certain sessions,<br />

intercepting audio and video meetings and<br />

injecting unsolicited content. While the<br />

application provider has since managed to<br />

fix the vulnerabilities, it demonstrates the<br />

importance of firms’ system defences.<br />

So how does a business successfully build<br />

resilience into their operations? A good<br />

multi-layered approach to controls and<br />

the hardening of a system’s exterior shell<br />

are critical for preventing attacks being<br />

successful. Organisations must decrease<br />

their ‘attack surface’ and make themselves<br />

more difficult to target in the first place.<br />

INSECURE NETWORKS<br />

One of the most common methods<br />

cyber criminals use to gain access to an<br />

environment is to exploit insecure network<br />

services, especially remote desktop<br />

protocol (RDP). Having a comprehensive<br />

understanding of all external-facing<br />

systems along with implementing an<br />

advanced Endpoint Detection and Response<br />

(EDR) solution will enable proactive<br />

techniques, such as machine learning and<br />

behavioral analysis, to identify potentially<br />

new or complex threats before they become<br />

a critical issue.<br />

As seen with the video conferencing<br />

example, it is also crucial to manage thirdparty<br />

risks. It is important to proactively<br />

identify weaknesses in the supplier<br />

landscape and have the ability to respond<br />

quickly to manage incidents when they<br />

occur. A robust due diligence process<br />

that considers the inherent risk profile of<br />

the supplier and service can significantly<br />

help an organisation to identify potential<br />

threats.<br />

Threat actors are continually evolving<br />

their tactics, techniques and procedures in<br />

new and inventive ways, responding to realworld<br />

events to capitalise on fear-based<br />

behaviours and decision making. Ensuring<br />

resilience is built in from the start,<br />

including employee’s ability to respond and<br />

react under pressure, is critical.<br />

Leanne Salisbury is Senior Manager,<br />

Technology Consulting, EY.<br />

Advancing the credit profession / www.cicm.com / <strong>October</strong> <strong>2021</strong> / PAGE 18

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!