News | HiddenRefer

Navigation

  • Home
  • Cloud
  • Crime
  • Cyber
  • Data Breaches
  • Drug Raids
  • Privacy
  • Security
Subscribe
News | HiddenRefer

The Best Curated Freebies in One Place

0
0
0
0
News | HiddenRefer
  • Home
  • Cloud
  • Crime
  • Cyber
  • Data Breaches
  • Drug Raids
  • Privacy
  • Security
  • Security

When Being Attractive Gets Risky

  • December 5, 2022
  • hiddenrefer
Attack Surface
Total
0
Shares
0
0
0
Advertisements

In the era of digitization and ever-changing business needs, the production environment has become a living organism. Multiple functions and teams within an organization can ultimately impact the way an attacker sees the organization’s assets, or in other words, the external attack surface. This dramatically increases the need to define an exposure management strategy.

To keep up with business needs while effectively assessing and managing cybersecurity risk, there are two primary elements that organizations should consider regarding their external attack surface: its size and its attractiveness to attackers. While organizations are typically focused on accounting for the size of their attack surface, its attractiveness is not typically top of mind, though it may have a significant impact on risk.

Attack Surface Size

How many assets are accessible from the outside world?

There is a delicate balance between business needs and security. While there are good reasons to expose more assets to the internet (i.e., for user experience, third-party integrations, and software architecture requirements), the price is an increased attack surface. Increased connectivity ultimately means more potential breach points for an adversary.

The bigger the attack surface is, and the more assets available to the adversary’s “playground,” the more an organization will need to mitigate the risk of exposure. This requires carefully crafted policies and procedures to monitor the attack surface and protect exposed assets continuously. Of course, there are basic measures, such as routinely scanning for software vulnerabilities and patching. However, there are also configuration issues, shadow IT, leaked credentials, and access management aspects to be taken into consideration.

An important note: the frequency of testing and validating should at least align with the pace of change of the organization’s attack surface. The more an organization makes changes to its environment, the more it needs to assess the attack surface. However, routine tests are still necessary even during periods of minimal change.

Attack Surface Attractiveness

While the size of the external attack surface is a well-understood indicator of cybersecurity risk, another aspect that is just as critical – though more elusive to organizations today – is how attractive an attack surface is to potential attackers.

When adversaries look for potential victims, they look for the lowest-hanging fruit. Whether it’s the easiest way to compromise a particular targeted organization or the easiest targets to attack to achieve their goals, they will be attracted to indicators of potential security weak spots in external-facing assets and will prioritize their activities accordingly.

When we talk about “attractive” assets, we don’t necessarily mean appealing targets, such as personal data, that can be sold on the black market. Attractions are the attributes of an asset that have the potential to be abused by adversaries. These are then marked as a potential starting point to propagate an attack.

An organization’s assets may all be patched to the latest and greatest software. However, these assets might still have attractive properties. For instance, a large number of open ports increases the number of protocols that can be leveraged to propagate an attack. It is important to emphasize that attacks are not necessarily tied to a vulnerability but can be an abuse of a well-known service. A good example of that can be found in this blog post from Pentera Labs describing how to abuse the PsExec utility. Also, some specific ports can be more attractive, for example, port 22, which enables SSH access from the outside world.

Another example is a website that allows file uploads. For some organizations, this is a critical service that enables the business, but for attackers, this is a convenient way to get their foot in the door. Organizations are well aware of the risk and can address it in different ways, but that doesn’t change the attractiveness of this asset and its corresponding risk potential.

The main challenge with dealing with attractions is that they are moving targets. The attractions change both in their number of instances and in their severity per configuration change.

To effectively assess the severity of an attraction, it is essential to understand how easy it is for an adversary to detect it during the enumeration phase and, more importantly, how easy it is to exploit it. For instance, having a VPN connection is easy to detect but difficult to exploit, and as a result, it can be a lower priority in an organization’s risk management plan. On the other hand, having an online contact form is easy to detect and has high exposure levels for SQL injections and exploit vulnerabilities like Log4Shell.

Decreasing the number of attractions reduces an organization’s risk, but that is not always possible. As a result, understanding the underlying risk and defining a plan to address it should be the organization’s number one priority to control exposures in the external attack surface while delivering on business needs.

Note: This article is written and contributed by a Product Marketing Manager at Pentera, the Automated Security Validation company. To read more, go to pentera.io.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



Total
0
Shares
Share 0
Tweet 0
Pin it 0
hiddenrefer

Previous Article
Increased privacy penalties and binding social media code tabled – Privacy Matters
  • Privacy

UK NIS – Get ready for expansion of the UK’s critical national infrastructure cyber security laws – Privacy Matters

  • December 5, 2022
  • hiddenrefer
View & Download
Next Article
CryWiper Data Wiper Malware
  • Security

Russian Courts Targeted by New CryWiper Data Wiper Malware Posing as Ransomware

  • December 5, 2022
  • hiddenrefer
View & Download
You May Also Like
Microsoft Urges Customers to Secure On-Premises Exchange Servers
View & Download
  • Security

Microsoft Urges Customers to Secure On-Premises Exchange Servers

  • hiddenrefer
  • January 28, 2023
SaaS Shadow IT
View & Download
  • Security

Eliminating SaaS Shadow IT is Now Available via a Self-Service Product, Free of Charge

  • hiddenrefer
  • January 28, 2023
BIND DNS Software Vulnerabilities
View & Download
  • Security

ISC Releases Security Patches for New BIND DNS Software Vulnerabilities

  • hiddenrefer
  • January 28, 2023
Wiper Malware
View & Download
  • Security

Ukraine Hit with New Golang-based ‘SwiftSlicer’ Wiper Malware in Latest Cyber Attack

  • hiddenrefer
  • January 28, 2023
Golden Chickens Malware Service
View & Download
  • Security

Experts Uncover the Identity of Mastermind Behind Golden Chickens Malware Service

  • hiddenrefer
  • January 27, 2023
PlugX Malware
View & Download
  • Security

Researchers Discover New PlugX Malware Variant Spreading via Removable USB Devices

  • hiddenrefer
  • January 27, 2023
Analyzing Orcus RAT
View & Download
  • Security

3 Lifehacks While Analyzing Orcus RAT in a Malware Sandbox

  • hiddenrefer
  • January 27, 2023
British Cyber Agency
View & Download
  • Security

British Cyber Agency Warns of Russian and Iranian Hackers Targeting Key Industries

  • hiddenrefer
  • January 27, 2023
  • Desmond Mills Jr. might not have been able 'to see' during Tyre Nichols beating: lawyer
    Desmond Mills Jr. might not have been able ‘to see’ during Tyre Nichols beating: lawyer
    • January 28, 2023
  • What Tyre Nichols, Rodney King tell us about race, policing
    What Tyre Nichols, Rodney King tell us about race, policing
    • January 28, 2023
  • Deadly Duo: Ivon and Alysia Adams are charged with the murder and abuse of 4-year-old Athena Brownfield, who was finally reported missing on 1/10/2023, but probably killed on Christmas
    Deadly Duo: Ivon and Alysia Adams are charged with the murder and abuse of 4-year-old Athena Brownfield, who was finally reported missing on 1/10/2023, but probably killed on Christmas
    • January 28, 2023
  • On The Statewide Montana Talks Network at SHOT Show 2023: Discussing a wide range of crime and gun control issues
    On The Statewide Montana Talks Network at SHOT Show 2023: Discussing a wide range of crime and gun control issues
    • January 28, 2023
  • Valentine’s Day Murder: Danielle Bewley shot and killed her husband, Mitchell, multiple times, telling people “he got what he deserved”; Now she got what she deserved and will spend the rest of her life in prison
    Valentine’s Day Murder: Danielle Bewley shot and killed her husband, Mitchell, multiple times, telling people “he got what he deserved”; Now she got what she deserved and will spend the rest of her life in prison
    • January 28, 2023

Featured Categories

Cloud Security
286 Posts
View Posts
Crime News
7486 Posts
View Posts
Cybersecurity
364 Posts
View Posts
Data Breaches
91 Posts
View Posts
Drug Raids
155 Posts
View Posts
Privacy
146 Posts
View Posts
Security
2250 Posts
View Posts
about
Navigation
  • Home
  • Cloud
  • Crime
  • Cyber
  • Data Breaches
  • Drug Raids
  • Privacy
  • Security
Featured
  • Desmond Mills Jr. might not have been able 'to see' during Tyre Nichols beating: lawyer
    Desmond Mills Jr. might not have been able ‘to see’ during Tyre Nichols beating: lawyer
    • January 28, 2023
  • What Tyre Nichols, Rodney King tell us about race, policing
    What Tyre Nichols, Rodney King tell us about race, policing
    • January 28, 2023
  • Deadly Duo: Ivon and Alysia Adams are charged with the murder and abuse of 4-year-old Athena Brownfield, who was finally reported missing on 1/10/2023, but probably killed on Christmas
    Deadly Duo: Ivon and Alysia Adams are charged with the murder and abuse of 4-year-old Athena Brownfield, who was finally reported missing on 1/10/2023, but probably killed on Christmas
    • January 28, 2023
  • On The Statewide Montana Talks Network at SHOT Show 2023: Discussing a wide range of crime and gun control issues
    On The Statewide Montana Talks Network at SHOT Show 2023: Discussing a wide range of crime and gun control issues
    • January 28, 2023
  • Valentine’s Day Murder: Danielle Bewley shot and killed her husband, Mitchell, multiple times, telling people “he got what he deserved”; Now she got what she deserved and will spend the rest of her life in prison
    Valentine’s Day Murder: Danielle Bewley shot and killed her husband, Mitchell, multiple times, telling people “he got what he deserved”; Now she got what she deserved and will spend the rest of her life in prison
    • January 28, 2023
News | HiddenRefer
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Input your search keywords and press Enter.