{"id":26543,"date":"2014-11-18T11:53:51","date_gmt":"2014-11-18T19:53:51","guid":{"rendered":"http:\/\/blogs.microsoft.com\/cybertrust\/?p=26543"},"modified":"2023-08-03T14:49:58","modified_gmt":"2023-08-03T21:49:58","slug":"precautions-protecting-v-perps","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2014\/11\/18\/precautions-protecting-v-perps\/","title":{"rendered":"7 Precautions for Protecting Against Perpetrators"},"content":{"rendered":"
Cyberattacks and data breaches continue to dominate the news globally. The reality is that most organizations face the same often reported threats and are carrying on their work towards counteracting those risks.<\/p>\n
Some organizations victimized by cybercriminals have shared information publicly. Others have chosen to conduct investigations and share information about the attack in a more limited way, or not at all. As a result, media themes related to cyberattacks can at times lack detailed information, with heavy reliance on unnamed sources.
\nUnderstanding today\u2019s landscape and formulating corresponding strategies, remains important to help organizations protect themselves against the tactics that have become commonplace.<\/p>\n
Phishing for a foothold<\/strong><\/p>\n In some recent high profile compromises, phishing attacks have been the primary method used by attackers to gain access to the network of their targeted victim. A phishing attack is an activity that \u201cengineers\u201d social or behavioral responses to compromise security \u2013 no software vulnerability is needed to try to trick a person using a computer or device, into revealing their user name and password. Cybercriminals conducting attacks continue to successfully trick individuals into providing their network credentials. The attackers then use any stolen credentials to illegally access the victim\u2019s machine, or in the case of organizations, the network. Once credentials have been obtained, the attacker may attempt to steal more credentials and get access to further resources on the network. For more information:<\/em> The latest Microsoft Security Intelligence Report<\/a>, volume 17, has more information on credential theft and how Microsoft is making it even harder for attackers to use stolen credentials.<\/p>\n Poor system hygiene<\/strong><\/p>\n Another form of trickery has to do with attackers using malicious email attachments to try to compromise a person or persons\u2019 systems. Their goal is often to steal individual passwords or other network credentials such as passwords used for other applications or services, in place within an organization\u2019s environment. These attacks could take advantage of known areas of weakness. Ensuring systems take advantage of the latest updates to provide increased security, is important. In these types of email attachment attacks, users are tricked into opening those attachments. Unbeknownst to them, the attachments are malicious. These malicious attachments are designed to compromise the users\u2019 systems and enable the attackers to steal their credentials, and systems that are not up to date are at increased risk of attack. This type of \u201cdocument parser exploit\u201d has been common for several years.<\/p>\n For more information:<\/em> The latest Microsoft Security Intelligence Report<\/a>, volume 17 has more information on document parser exploits. Primary areas include:<\/p>\n Privilege principles: least privilege not in use<\/strong><\/p>\n Once cyberattackers have stolen credentials, they may be able to access their victim\u2019s network. On networks where least privilege principles have been implemented, attackers are often thwarted in their attempts to move swiftly across the network and achieve their goal of gaining access to resources they need to further compromise more systems.<\/p>\n Protect high value assets <\/strong><\/p>\n Each organization needs to determine what they consider to be their crown jewels and how to optimally protect those high value assets. For a number of reasons, high value assets may be co-mingled with other assets, as opposed to being more isolated or protected, within that network. In choosing not to isolate assets, the number of people who can regularly access systems, increases. For a cyberattacker with stolen network credentials, they could now have access to those high value assets, simply because the most important ones weren\u2019t managed in a more protected or isolated way. Additionally, encrypting assets such as card swipe data, pin input data, data in flight, and data in storage, is as important a step as network isolation. These practices are not universally deployed by organizations and can contribute to the success of malicious activity. For more information: <\/em>Microsoft\u2019s Security Intelligence Report<\/a> volume 17 has information on strategies covering the isolation and encryption of high value assets.<\/p>\n Protecting administrator credentials <\/strong><\/p>\n Microsoft has published a series of papers on targeted attacks that includes guidance on mitigating credential theft. One such attack, called \u201cpass-the-hash,\u201d has been an attacker favorite for many years. This attack is typically used once the attackers have a stolen set of user credentials and have compromised the victim\u2019s network. The goal of the attack is to harvest as many stolen credentials as possible in order to further compromise the victim\u2019s network and remain undetected for as long as possible. Protecting administrator credentials is a critical step in containing this type of attack. Organizations that have not adopted these best practices are at increased risk against these well-known credential theft and reuse attacks. For more information: <\/em>This recent paper<\/a> discusses Pass-the-Hash (PtH) attacks against Windows operating systems and provides holistic planning strategies that, when combined with the Windows security features, will provide a more effective defense against pass-the-hash attacks. The strategies are useful for all types of software, as the PtH attack type is regularly used against all systems.<\/p>\n Perpetrator\u2019s ongoing motivation <\/strong><\/p>\n The main objective of targeted attacks continues to be the theft of high value data assets; not just compromising systems. Protect, Detect, and Respond <\/strong><\/p>\n Many organizations continue to use a security strategy centered on the concepts of protection and recovery. If only focused on these two categories, when the perimeter of the network is compromised,\u00a0\u00a0 controls may be lacking to detect attackers and contain malicious activity. A more holistic security strategy that assumes a breach may occur, will benefit most organizations. This includes the establishment of effective ongoing monitoring, detection, management, and operational controls.<\/p>\n","protected":false},"excerpt":{"rendered":" Cyberattacks and data breaches continue to dominate the news globally. The reality is that most organizations face the same often reported threats and are carrying on their work towards counteracting those risks. Some organizations victimized by cybercriminals have shared information publicly. Others have chosen to conduct investigations and share information about the attack in a […]<\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3659],"topic":[3675],"products":[],"threat-intelligence":[],"tags":[3896,3753,3822],"coauthors":[1842],"class_list":["post-26543","post","type-post","status-publish","format-standard","hentry","content-type-best-practices","topic-information-protection-and-governance","tag-credential-theft","tag-cybersecurity-policy","tag-microsoft-security-insights"],"yoast_head":"\n\n
\nAttackers that target organizations do so because of the high value assets that exist there; such as personally identifiable information like credit card numbers or other personal information. Many criminals sell or trade such information to other criminals that seek to steal funds from bank accounts and ultimately steal identities. The victims of recent high profile attacks were targeted because they process millions of financial transactions and hold information on millions of consumers. These assets are more attractive to attackers than the satisfaction of compromising any system; whether Windows-based or any other operating system.<\/p>\n