01.03.2024 Views

The Cyber Defense eMagazine March Edition for 2024

Cyber Defense eMagazine March Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225 page March Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine March Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225 page March Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

where the attacker tries to guess the same password against multiple accounts; credential stuffing, where<br />

the attacker uses known credentials from a breach and uses them against other services where the user<br />

may have an account; and brute <strong>for</strong>cing, where the attacker guesses multiple passwords against the<br />

same account.<br />

Unlike the adversary in the middle attack example from earlier, this attack requires no interaction on the<br />

part of the victim. Tools like MFASweep and trevorspray, which are both available free and open source<br />

on GitHub, allow attackers to carry out credential attacks and check to see if any accounts lack MFA. An<br />

attacker that finds an account with a weak password and no MFA has found a prime target <strong>for</strong> a business<br />

email compromise attack.<br />

VPN use <strong>for</strong> initial access<br />

This tactic is more closely aligned with defense evasion than initial access, but it’s included here because<br />

it’s a common attribute of account takeovers. According to reports from the Huntress Security Operations<br />

Center, about 75% of confirmed attacks against Microsoft 365 identities come from VPNs. A smaller<br />

percentage of attacks come from anonymous proxies, like Tor. While VPNs and proxies are different<br />

technologies, it’s considered that they are similar in terms of impact to partners. Threat actors use proxies<br />

and VPNs to conceal their IP address while per<strong>for</strong>ming account takeovers.<br />

Like a good jiu-jitsu counterattack, security businesses can use this tactic to their own advantage as<br />

defenders. Is VPN use normal <strong>for</strong> their users? If VPN is normal, which types of VPNs should be in use?<br />

Analyzing the IP address from the login can reveal key facts and intelligence that they can factor into the<br />

threat calculus, like the IP’s service provider or if the IP is a known exit node <strong>for</strong> a shady proxy service.<br />

This allows them to differentiate between a user who logs in while using a common corporate SASE<br />

solution and a user who logs in from Tor. <strong>The</strong>se two events aren’t the same in terms of risk and good<br />

detection programs should be able to recognize it and act accordingly.<br />

Conclusion<br />

Taking a bite out of BEC is about <strong>for</strong>estalling adversaries at any point along the attack chain. Identifying<br />

and combating tactics that indicate different phases of the attack chain, like persistence, defense evasion<br />

and execution activity, is an effective means of combating business email compromise. Every phase of<br />

the attack chain can telegraph different indicators and presents opportunities <strong>for</strong> detection. It only takes<br />

one detection to halt what would otherwise be a business-ending event. For businesses' own security<br />

programs, maybe initial access is a great initial place to look!<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2024</strong> <strong>Edition</strong> 104<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!