01.03.2024 Views

The Cyber Defense eMagazine March Edition for 2024

Cyber Defense eMagazine March Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225 page March Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine March Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225 page March Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

This is a big story – not just because it’s Microsoft, but precisely because of the nature of the attack.<br />

Threat actors love a “simple” hack. Credential stuffing is incredibly easy and presents a massive return<br />

on investment. Threat actors love legitimate credentials <strong>for</strong> multiple reasons, including:<br />

1. Access - Once I have credentials, I have access to the environment.<br />

2. Observation – I can sit quietly in an environment and watch what happens – how does the IT<br />

team work? What do your security people monitor <strong>for</strong>?<br />

3. Escalation – Threat actors can profile out a network and deploy further tools to harvest more<br />

credentials, deploy malware, or as we saw in the Midnight Blizzard attack, read emails.<br />

As a threat actor, if all I must do is compromise an account, then I already have what I would normally<br />

have to expend a lot of ef<strong>for</strong>t to gain – legitimate credentials. Once I have legitimate credentials in an<br />

environment, it’s much easier to monitor traffic and learn what I need to do to mask my activity, making<br />

it that much harder <strong>for</strong> defenders to catch me. <strong>The</strong>re’s a reason the cybercriminal ecosystem exists – by<br />

harvesting credentials and compiling them, threat actors can perpetrate these sorts of attacks and gain<br />

legitimate access to environments, at which point the ball is in their court and they have control of the<br />

game.<br />

So how does all this tie into returning to basics? <strong>The</strong> important thing about the Microsoft story is not that<br />

it was Midnight Blizzard – it’s that it was a basic credential stuffing attack against an unprotected account.<br />

Microsoft is a three-trillion-dollar company – if this happened to them, it certainly could happen to you.<br />

Credentials are traded by cybercriminal organizations all the time, both on the clear web and the dark<br />

web. Ensuring you are doing your level best to protect your systems against these sorts of attacks will<br />

reduce your threat profile and make it that much harder <strong>for</strong> a threat actor to gain access to your<br />

environment. Be sure, they will gain access, but if they have to expend additional ef<strong>for</strong>t to get into your<br />

environment rather than a simple credential stuffing attack, that gives you that much more time to detect<br />

and evict them be<strong>for</strong>e they can wreak havoc.<br />

How do you return to the basics? Take these as action items <strong>for</strong> your <strong>2024</strong> Back to Basics checklist:<br />

1. Use complex, unique passwords. <strong>The</strong> proliferation of password management software makes<br />

generating unique complex passwords <strong>for</strong> accounts extremely simple. NIST recommendations<br />

around password management involve changing passwords only when compromise is suspected,<br />

or every 365 days. This puts less pressure on your users to constantly evolve passwords they<br />

have to memorize and gives you easier monitoring <strong>for</strong> your security team. Combined with<br />

password managers, it is relatively easy to drastically improve the security of your passwords<br />

beyond using !Spring<strong>2024</strong>!.<br />

2. Use multi-factor authentication. It is <strong>2024</strong>, not 2004. Multi-factor authentication being enabled<br />

wherever possible is a must, not a maybe. <strong>The</strong> internet is chock-full of automated attacks just<br />

waiting <strong>for</strong> an unsecured account. Multi-factor authentication comes with its own challenges, but<br />

something is better than nothing when it comes to delaying tactics.<br />

3. Monitor strange activity on accounts. If you’re using complex passwords and multi-factor<br />

authentication, then the next step is to monitor <strong>for</strong> aberrant access. If someone logs in every day<br />

from New York City, and then suddenly they log in from a <strong>for</strong>eign country, that could be an<br />

indicator of compromise. While not every odd login is malicious, all malicious logins are odd.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2024</strong> <strong>Edition</strong> 167<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!