Healthcare Cybersecurity

Healthcare Organizations Warned About MedusaLocker Ransomware Attacks

The healthcare and public health (HPH) sector has been warned about cyberattacks involving MedusaLocker ransomware – one of the lesser-known ransomware variants used in cyberattacks on the sector. The HPH sector has been extensively targeted by prolific ransomware groups using ransomware variants such as Clop, Royal, and BlackCat, but attacks involving these lesser-known variants can be just as damaging.

The threat actor behind MedusaLocker is believed to run a ransomware-a-service operation, where affiliates are recruited by the group to conduct attacks for a cut of any profits they generate, which is believed to be around 55%-60% of the ransom payment for MedusaLocker ransomware affiliates. The ransomware variant was first detected in September 2019 and the group is thought to primarily target the HPH sector. Since 2019, the majority of attacks have used phishing and spam emails with malicious attachments as the initial access vector. When the attachments are opened, a connection is made to the command-and-control server, and a script and the ransomware payload are downloaded. Propagation is believed to occur via WMI.

In 2022, the group started to leverage vulnerabilities in Remote Desktop Protocol, and this now appears to be the preferred initial access vector. The group exploits vulnerable RDP services and compromises legitimate RDP accounts using brute force tactics to guess weak passwords. After gaining access to victims’ networks, the group establishes persistence through registry entries, escalates privileges, moves laterally, exfiltrates data, then deploys the ransomware. MedusaLocker ransomware uses a hybrid encryption approach, first encrypting files with an AES-256 symmetric encryption algorithm, then encrypting the secret key with RSA-2048 public-key encryption. Backup copies of encrypted files are deleted to prevent recovery without paying the ransom. While the group behind MedusaLocker has a network of Russian hosts for conducting attacks, the group also leverages U.S. infrastructure, including using the compromised infrastructure of data centers and U.S. universities as redirects to obfuscate their attacks.

The Health Sector Cybersecurity Coordination Center (HC3) explained some of the known tactics, techniques, and procedures used by the group and suggests several mitigation measures. Since the group now favors RDP compromise, it is important to ensure that RDP instances have multiple levels of access and authentication controls. HC3 recommends monitoring RDP utilization, flagging and investigating first-time-seen and anomalous behavior such as failed login attempts, and implementing a robust account lockout policy to defend against brute force attacks.

RDP should never be exposed to the Internet, the patching of RDP vulnerabilities should be prioritized, strong passwords should be set, multi-factor authentication implemented on accounts, and if remote users need to access the corporate network via RDP, a VPN should be used. HC3 also recommends restricting access to the Remote Desktop port to trusted IP addresses and changing the default RDP port from 3389 to another port. To protect against phishing attacks, healthcare organizations should consider disabling hyperlinks in emails and adding a banner to all emails that have been received from an external email address.

You can view the HC3 MedusaLocker Ransomware Analyst Note on this link (PDF)

The post Healthcare Organizations Warned About MedusaLocker Ransomware Attacks appeared first on HIPAA Journal.

HC3 Issues HPH Sector Alert Following Suspected Clop Cyberattacks

In Early February, a zero-day vulnerability in Fortra’s GoAnywhere MFT secure file transfer software (CVE-2023-0669) was exploited in attacks on more than 130 organizations, including several in the healthcare industry such as Community Health Systems (CHS) in Tennessee. That attack affected up to 1 million patients. Fortra issued an alert about the vulnerability in early February when it was discovered to have been exploited in attacks and issued workarounds to prevent exploitation ahead of an emergency patch being released, which was made available on February 7.

The attacks have prompted the Health Sector Cybersecurity Coordination Center (HC3) to issue a further warning about the Clop ransomware group, which claimed responsibility for the attacks. According to Clop, the attacks occurred over a period of around 10 days. The group claims to have exploited the vulnerability – a pre-authentication remote code execution vulnerability in the License Response Servlet – allowing the theft of sensitive data. Clop typically uses ransomware to encrypt files after exfiltrating sensitive data, then issues a ransom demand and a threat to publicly release data if payment is not made. In these attacks, the group said it could have deployed ransomware but chose not to do so, instead opting for an extortion-only approach.

Clop is a Russia-linked ransomware group that has been active since at least February 2019, when the first observed attack was conducted by a threat group tracked as TA505 – the group behind the infamous Dridex banking Trojan. Clop (or Cl0p) is the name of the ransomware variant deployed in attacks, which have largely been conducted on organizations in the HPH sector and other critical infrastructure operators. A law enforcement operation against Clop saw 6 individuals arrested in Ukraine in June 2021; however, the group has continued to operate, apparently unaffected by those arrests and continues to pose a major threat to the healthcare and public health (HPH) sector.

HC3 first issued a warning about the Clop ransomware group in March 2021, and in January this year issued an updated Analyst Note following continued attacks on the HPH sector. While details of some of the tactics, techniques, and procedures used by the Clop ransomware gang have been shared by HC3, the Clop group continues to evolve its tactics as the latest string of attacks has clearly demonstrated.

Defending against cyberattacks by a highly capable threat group that constantly changes tactics can be a challenge; however, HC3 recommends following the advice of many cybersecurity professionals by “prioritizing security by maintaining awareness of the threat landscape, assessing their situation, and providing staff with tools and resources necessary to prevent a cyberattack remains the best way forward for healthcare organizations.”

The latest HC3 alert can be found here.

The post HC3 Issues HPH Sector Alert Following Suspected Clop Cyberattacks appeared first on HIPAA Journal.

Healthcare Sector Warned About Increase in GootLoader Malware Infections

Security researchers have issued warnings following an increase in cyberattacks distributing a malware variant called GootLoader. GootLoader is a malware loader first identified in 2014 that is now one of the biggest malware threats. The threat group behind the campaign is highly capable and has been evolving its tactics and actively developing the malware to better evade security defenses.

The delivery of GootLoader is the first stage of an attack chain that will see multiple malicious payloads delivered, such as Cobalt Strike Beacon, FoneLaunch, and SnowCone. FoneLaunch is a .NET loader that loads encoded payloads in the memory and SnowCone is a downloader that retrieves and executes payloads that are used in the next stage of the attack, including the IcedID banking Trojan and malware dropper.

According to security researchers at Mandiant, GootLoader appears to be exclusively used by a threat actor it tracks as UNC2565. In 2022, UNC2565 adopted notable new tactics, techniques, and procedures (TTPs) and is actively evolving its TTPs to improve the effectiveness of its campaigns, including adding new components and obfuscations to the infection chain. GootLoader is primarily spread through compromised websites. Traffic is sent to those websites using SEO poisoning, which involves creating web content using search engine optimization tactics to get the sites to appear high in the search engine listings for specific business-related search terms. These can include business-related documents such as contract templates and service-level agreements. When a user arrives on the site they are tricked into downloading a malicious file, which is typically a ZIP archive that includes an obfuscated JavaScript file that masquerades as the document being searched for. If that file is executed, the infection chain is initiated leading to GootLoader being installed and other malicious payloads being delivered and executed.

Mandiant says UNC2565 changed the attack sequence in November 2022 and modified the .js file in the ZIP file to deliver a new variant dubbed GootLoader.PowerShell, which writes a second JavaScript file to the system disk that reaches out to 10 hard-coded URLs and exfiltrates system information. The new variant was used in a wave of attacks on the healthcare sector in Australia in late 2022.

Security researchers at Cybereason have also issued a warning about UNC2565 following an increase in attacks in the United States, United Kingdom, and Australia. In addition to SEO poisoning, Cybereason researchers say the group has started using Google Ads to drive traffic to their malicious websites and is now using Cobalt Strike and SystemBC for data exfiltration. New tactics identified include multiple JavaScript loops that delay the execution process, which they believe have been adopted to evade sandbox mechanisms. They also report that after GootLoader is executed, the threat actors move quickly and manually deploy attack frameworks, elevate privileges, and move laterally within compromised networks. That process typically takes less than 4 hours. While multiple sectors have been targeted, attacks have primarily been focused on organizations in the finance and healthcare sectors, with Cybereason’s researchers considering the threat level to be severe.

Researchers at both companies say UNC2565 is actively developing its TTPs and increasing its capabilities, and organizations in the healthcare sector should be on high alert. Network defenders can obtain further information on the TTPs, Indicators of Compromise (IoCs), and recommended mitigations in the GootLoader reports from Mandiant and Cybereason.

The post Healthcare Sector Warned About Increase in GootLoader Malware Infections appeared first on HIPAA Journal.

HC3 Issues DDoS Guide for the Healthcare Sector

The Health Sector Cybersecurity Coordination Center (HC3) at the Department of Health and Human Services has issued a DDoS guide for the healthcare sector that includes information on the threat and recommended mitigations to limit the severity and impact of DDoS attacks.

Distributed-Denial-of-Service (DDoS) attacks are a type of resource exhaustion flooding attack that involves consuming the resources of a server, service, or network to prevent legitimate use. These attacks typically involve the use of botnets of compromised computers and IoT devices, which flood the targeted IP address with traffic to cause the server, service, or network to become overwhelmed. These attacks can result in a denial-of-service to normal traffic due to the log jam the huge volume of malicious traffic creates. These attacks typically cause disruption for several hours, although attacks can continue for several days.

These attacks usually only cause temporary disruption to services and do not, by themselves, typically involve data theft or cause hardware damage. Attacks may, however, be conducted as a smokescreen to distract security teams. While the security team is dealing with the DDoS attack, the threat actor attempts a simultaneous attack – for example, port scanning, malware delivery, a phishing attack, or data exfiltration.

DDoS attacks may also be conducted as part of an extortion attack, where a ransom demand is issued and payment is required to stop the attack. HC3 says these ransom DDoS attacks are becoming more common and have increased by 24% quarter-over-quarter and 67% year-over-year. These ransom DDoS attacks are typically conducted on web applications, such as patient portals, webmail, patient monitoring applications, and telehealth services.

The healthcare and public health (HPH) sector is currently being targeted by a pro-Russian hacktivist group called Killnet. Killnet has been conducting DDoS attacks in countries that are providing support to Ukraine, with a particular focus on hospitals and medical organizations. While the group has threatened to steal and publicly release sensitive patient data, these claims may simply be attention-seeking behavior. The DDoS attacks conducted by the group in recent weeks do not appear to have involved any other malicious activity other than causing a denial-of-service on websites and web applications.

While it is difficult to prevent targeted DDoS attacks, several steps can be taken to limit the severity and impact of DDoS attacks. Since these attacks typically target websites and web applications, security controls should be implemented to protect these assets. “Healthcare organizations should sanitize, increase resource availability, implement cross-site scripting (XSS) and cross-site request forgery (XSRF) protections, implement Content Security Policy (CSP), and audit third party code,” suggest HC3. “Additional steps include running static and dynamic security scans against the website code and system, deploying web application firewalls, leveraging content delivery networks to protect against malicious web traffic, and providing load balancing and resilience against high amounts of traffic.” Since threat actors typically use User Data Protocol (UDP), SYN (synchronize), and Transmission Control Protocol (TCP) to perpetuate DDoS attacks, these should also be a focus for network defenders.

The alert includes several other recommendations for preventing attacks, assessing and mitigating attacks in progress, and improving defenses and incident response processes to limit the harm caused by future attacks.

The post HC3 Issues DDoS Guide for the Healthcare Sector appeared first on HIPAA Journal.

Mandiant: Organizations Are Not Getting the Maximum ROI from Threat Intelligence

The threat intelligence provider, Mandiant, says almost all cybersecurity leaders are happy with the threat intelligence they are consuming, but that intelligence is not always considered when they develop their cyber strategies and make purchasing decisions. The failure to effectively use threat intelligence data prevents organizations from getting the maximum ROI on their investment and reduces the effectiveness of their cybersecurity strategies.

Mandiant commissioned a survey of 1,350 cybersecurity decision-makers at organizations with at least 1,000 employees, across 18 sectors in 13 countries to gain a global perspective on how organizations are leveraging threat intelligence to navigate the global cybersecurity threat landscape. The survey confirmed that organizations typically receive threat intelligence from multiple sources, and 96% of cybersecurity leaders say they are happy with the threat intelligence they were receiving; however, 47% of respondents said they struggle to effectively apply threat intelligence throughout their organization and almost all respondents (98%) said they need to be faster at implementing changes based on the threat intelligence they receive.

A majority of respondents (79%) admitted to making purchasing decisions based on current cyberattack trends, without gaining insights into the attackers that are actually targeting their industry and the tactics they are using. For instance, security teams often implement defenses against advanced persistent threat actors (APT), when these nation-state actors do not actually pose a threat to their organization or sector. Security teams receive huge numbers of alerts about software vulnerabilities yet fail to use threat intelligence to identify which vulnerabilities are actually being exploited by the threat actors targeting their sector, or if the threat actors would even be able to exploit the vulnerabilities. While more than 85% of security leaders appreciate the importance of identifying attackers, their tools and techniques, and motivations, only 34% said they consider the source of a potential attack when they test their cybersecurity defenses.

If threat intelligence is not factored into purchasing decisions, solutions may be purchased that fail to provide the optimum level of protection against the most pertinent threats to their sector, which could weaken their cybersecurity strategy. Organizations that factor threat intelligence into purchasing decisions and cybersecurity strategies can achieve optimal protection against the tactics, techniques, and procedures used by the threat actors that are actually targeting their organization.

Even though security decisions are made without insights into the threat actors that are attacking them, security decision-makers were still confident in their cybersecurity defenses, especially against financially motivated threats such as ransomware. 91% of respondents were confident about their ability to protect against ransomware attacks, 89% were confident about defending against attacks by hacktivists, 83% were confident about defending against nation-state threat actors, and almost all respondents (95%) were confident they could prove to their senior leadership that they had a moderate to highly effective cybersecurity strategy.

More than two-thirds of cybersecurity decision-makers said they believe their senior leadership teams underestimate the cyber threat posed to their organization and 68% said their organization needs to improve its understanding of the threat landscape. While security teams understand the importance of threat intelligence, 79% of respondents admitted that they could focus more time and energy on identifying critical trends. The survey also revealed threat intelligence is not shared frequently enough throughout the organization. For example, Cybersecurity is only discussed on average once every four or five weeks with various departments within organizations, and only 38% of security teams share threat intelligence with a wider group of employees for risk awareness.

“A conventional, check-the-box mindset isn’t enough to defend against today’s well-resourced and dynamic adversaries. Security teams are outwardly confident, but often struggle to keep pace with the rapidly changing threat landscape. They crave actionable information that can be applied throughout their organization,” said Sandra Joyce, Vice President, Mandiant Intelligence at Google Cloud. “As our ‘Global Perspectives on Threat Intelligence’ report demonstrates, security teams are concerned that senior leaders don’t fully grasp the nature of the threat. This means that critical cyber security decisions are being made without insights into the adversary and their tactics.”

One of the problems highlighted by the survey is information overload. Organizations receive vast amounts of threat data that needs to be processed and there is concern that important information may be missed. 84% said they were concerned that they may be missing vital threat intelligence due to the number of alerts and data they have to process, and 69% of respondents said they feel overwhelmed by the threat intelligence data they receive. In healthcare, 79% of respondents said they feel somewhat or completely overwhelmed by the amount of data and alerts they have to deal with.

Mandiant offers several suggestions that can help security leaders maximize their investment and effectively operationalize their cyber threat intelligence. Organizations should regularly evaluate the data received to make sure it is timely, trustworthy, and accurate. It is important to learn about the threat actors that are actually targeting the organization and sector, adapt defenses accordingly, then test defenses and the organization’s response to the attack tactics that have been identified and track improvements over time. Threat intelligence also needs to be leveraged across all security systems and processes to proactively protect against all potential threats. Organizations should also ensure that threat intelligence is communicated effectively with stakeholders to allow that intelligence to be factored in when making purchasing decisions.

The post Mandiant: Organizations Are Not Getting the Maximum ROI from Threat Intelligence appeared first on HIPAA Journal.

Healthcare Organizations Most Common Victims in 3rd Party Data Breaches

Cyberattacks on business associates of healthcare organizations have increased to the point where attacks on business associates now outnumber attacks on healthcare providers. In addition to an increase in cyberattacks on third-party suppliers, the impact and destruction caused by those attacks have also increased, according to a recent report from the vendor risk management company, Black Kite.

Each year, Black Kite analyzes the impact of third-party cyberattacks and data breaches and publishes the findings in its Third-Party Breach Reports. For the 2023 report, Black Kite analyzed 63 third-party breaches which affected at least 298 companies, and reports a doubling of the impact and destruction caused by those breaches. In 2021, an average of 2.46 companies were affected by each third-party breach with the number of affected companies increasing to an average of 4.73 per breach in 2022.

The most common root cause of third-party data breaches in 2022 was unauthorized network access, which accounted for 40% of cyberattacks on third parties. Black Kite attributes the increase in these types of intrusions to the continued high numbers of employees working remotely, which introduces vulnerabilities that cybercriminals can exploit.  Ransomware continues to be extensively used in cyberattacks on third parties and was involved in 27% of third-party breaches in 2022; however, there was a slight year-over-year decrease in ransomware attacks. Black Kite attributes the decrease to Russian sanctions, which have hampered the ability of Russian cybercriminals to conduct ransomware attacks. 9.5% of breaches were due to unsecured servers, 6.3% of breaches were due to human error, 3.2% were caused by phishing, and 3.2% involved malware.

Other notable findings include an increase in the time taken to notify the companies affected by these breaches, which increased by around 50% year-over-year to an average of 108 days from the date of the attack to the disclosure date. The delay in notifications means cybercriminals are given more time to misuse stolen data, resulting in even greater damage. Technical service vendors were the most targeted third parties, accounting for 30% of all data breaches, followed by vendors of software services and healthcare services. Healthcare organizations were the most common victims of third-party breaches, accounting for 34.9% of third-party incidents in 2022 – up 1% from 2021 – followed by finance (14%), and government (14%).

“Global business ecosystems continue to get more complex, with every organization increasingly impacted by the cybersecurity posture of their partners, and their partners’ partners, and so on,” said Jeffrey Wheatman, Senior Vice President, and Cyber Risk Evangelist at Black Kite. “The reality is your attack surface is much bigger than the stuff you can control. But the good news is, you can assess and monitor your extended ecosystem to spot vulnerabilities, take action and avoid catastrophe.”

The post Healthcare Organizations Most Common Victims in 3rd Party Data Breaches appeared first on HIPAA Journal.

Warning Issued About North Korean Ransomware Attacks on Healthcare Organizations

A joint cybersecurity advisory has been issued by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), Department of Health and Human Services (HHS), and the Republic of Korea’s Defense Security Agency and National Intelligence Service warning of state-sponsored North Korean (DPRK) ransomware attacks on U.S. critical infrastructure organizations. The agencies have gathered increasing evidence that DPRK threat actors are conducting the attacks to obtain ransom payments to support DPRK national-level priorities and objectives, and the U.S. healthcare and public health (HPH) sector is one of the primary targets.

“The North Korean actor behind these incidents, best known as Andariel, has been carrying out a targeted global ransomware campaign against hospitals and healthcare providers. Hospitals that are already under enormous pressure have experienced major disruptions, most of which have gone unnoticed to the public,” John Hultquist, Head of Mandiant Intelligence Analysis – Google Cloud, told the HIPAA Journal. “In many cases, hospitals have quietly recovered their systems or paid out the ransom without ever reporting the incident or even knowing they were dealing with North Korean spies. This suits the North Koreans who can’t be legally paid due to sanctions. They often hide their identity by claiming to be known ransomware operators.”

Andariel has used multiple ransomware variants in their attacks, especially strains such as Maui and H0lyGh0st, although the authoring agencies have identified DPRK involvement with attacks using BitLocker, Deadbolt, ech0raix, GonnaCry, Hidden Tear, Jigsaw, LockBit 2.0, My Little Ransomware, NxRansomware, Ryuk, and YourRansom. Exploits for a range of common vulnerabilities and exposures (CVEs) are used to gain initial access to networks and escalate privileges, with recent exploits including the Log4Shell vulnerability in Apache Log4j software library (CVE 2021-44228), and unpatched vulnerabilities in SonicWall appliances (CVE-2021-20038) and TerraMaster NAS devices (CVE-2022-24990).

There are sanctions risks for organizations paying ransom demands to North Korean threat groups. The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has designated numerous malicious actors under its cyber-related sanctions program, including Andariel. To get around these restrictions, the DPRK threat actors obfuscate their involvement by operating with or under third-party foreign affiliate identities and use third-party foreign intermediaries to receive ransom payments. Virtual private networks (VPNs), virtual private servers (VPSs), and third-country IP addresses are used to make it appear that the attacks did not originate in the DPRK.

“Andariel’s core mission is to gather intelligence for the North Korean state, targeting the government, the defense sector, journalists, among others. In contrast to some of their peers who are solely focused on filling state coffers, Andariel appears to use crime as a means to self-fund their operations,” explained Hultquist. “Cybercrime is a lifeline for the North Korean regime and necessary to keep their cyber capabilities afloat. They are unlikely to be deterred anytime soon, so the impetus is on us to step up and defend our hospitals, before someone gets hurt.”

The cybersecurity advisory includes details of the tactics, techniques, and procedures used by the DPRK threat actors, along with Indicators of compromise (IoCs) and recommended mitigations.

The post Warning Issued About North Korean Ransomware Attacks on Healthcare Organizations appeared first on HIPAA Journal.

28% BEC Emails are Opened and 15% Get a Reply

Business Email Compromise scams are the biggest cause of losses to cybercrime. Over the past 5 years, more than $43 billion has been lost to the scams, according to the FBI’s Internet Crime Complaint Center (IC3). In its March 2022 report, the FBI said IC3 had received reports of $2.4 billion in losses to BEC attacks in the last year across almost 20,000 reported attacks, and attacks are continuing to increase. According to a new study by Abnormal Security, between H1 and H2 2022, there was an 81% increase in BEC attacks and a 147% increase in BEC attacks on small businesses over that same period. There are no signs of the attacks slowing, and in all likelihood, they will continue to increase.

BEC attacks target human weaknesses. The attackers use social engineering techniques to trick employees into making fraudulent wire transfers, changing bank account information for upcoming vendor payments, changing direct deposit information for employees, purchasing gift cards, and disclosing sensitive data. As with phishing attacks, fear and urgency are used to get employees to respond quickly without verifying the legitimacy of the request. These attacks typically use a compromised email account or the sender is spoofed, and that individual is impersonated. Many employees open these emails and an alarming percentage reply and engage with the scammers.

Email-based attacks, such as BEC, phishing, extortion, scams, and malware continue to increase. According to Abnormal Security, email attack volume increased by 22% overall, rising from an average of 85.13 attacks per 1,000 mailboxes in H1 2022 to 104.04 attacks per 1,000 mailboxes in H2 2022. While the increase in attacks is a cause of concern, more worrying is the number of employees that engage with the attackers and fail to identify and report email threats.

Abnormal Security monitored the email environments of hundreds of organizations between July and December 2022 and found the median open rate for text-based BEC attacks was 28% and the average read rate was 20%. While opening and reading these emails does not necessarily mean that the employee will ultimately be fooled by the scam, on average, 15% of the malicious emails were replied to.

Abnormal Security reports that while only 0.28% of employees engaged with more than one attack, more than one-third of replies were initiated by employees who had previously engaged with a scammer in an earlier attack. This could indicate a lack of training in response to the first attack to the failure of the employees to take their training on board. It is also possible that certain employees are targeted frequently due to their role in the organization, and the more BEC emails an individual receives, the greater the chance that they will eventually mistake an attack for a legitimate email request.

While employees in transportation were the most likely to reply to these attacks, the reply rates were also high in healthcare, which ranked third with a reply rate of 8.22%. Abnormal Security suggests the healthcare industry is particularly susceptible to these types of attacks, as the industry attracts people who have a strong desire to help others and there is often a high turnover rate in hospitals and large health systems, making it more likely that employees would not know their colleagues personally, which makes impersonation much easier.

The study also revealed an alarmingly low reporting rate for these emails. On average, only 2.1% of all known attacks are reported by employees to their security teams, and the majority of messages that are reported to the security team – 84% – are not malicious. The findings of the study highlight the importance of conducting ongoing security awareness training, with a strong emphasis on phishing and BEC attacks. Organizations should also consider conducting phishing and BEC attack simulations, as the data from these simulations indicate that this is one of the most effective ways of training. Organizations should make it as easy as possible for employees to report potential threats and reporting should be encouraged. A mail client add-on that allows single-click reporting of potentially malicious emails should be considered.

As Abnormal Security points out, even with training, employees are likely to make mistakes, so the best defense is to ensure that these malicious emails are blocked and do not land in inboxes, which means upgrading from a traditional email security solution to one that incorporates machine learning/AI algorithms capable of detecting small anomalies in email content.

“Because advanced email attacks like business email compromise and supply chain compromise exploit trusted email accounts and relationships, organizations need email security that can detect even small shifts in activity and content,” explained Abnormal Security in the report. “The most effective email security platforms baseline known-good behavior across employees and vendors, and then detect and remediate malicious emails in milliseconds to prevent end-user engagement.

The post 28% BEC Emails are Opened and 15% Get a Reply appeared first on HIPAA Journal.

RDP and Cloud Databases Most Common Targets of Threat Actors

Malicious actors used a variety of methods to gain initial access to victims’ networks but in 2022, cybercriminal groups appeared to focus on Remote Desktop Protocol and attacking cloud databases, according to cyber insurer Coalition. RDP is one of the most common ways that initial access brokers (IABs) and ransomware gangs gain access to victims’ networks and RDP is by far the most common remote-scanning by malicious actors. RDP scanning traffic was very high in 2022, with data collected from Coalition’s honeypots indicating RDP scans accounted for 37.67% of all detected scans. Whenever a new vulnerability is identified in RDP, scans soar as cybercriminals rush to identify targets that can be attacked.

Ransomware continues to be an enormous problem. In 2022, the gangs increasingly targeted cloud databases, especially Elasticsearch and MongoDB databases, a large number of which have been captured by ransomware gangs. The team identified 68,423 hacked MongoDB databases in 2022, and 22,846 Elasticsearch databases that had been ransomed.

The number of new software vulnerabilities has been growing steadily over the past 6 years. In 2022, more than 23,000 new common IT vulnerabilities and exposures (CVEs) were discovered, the highest number of any year to date. Coalition predicts this trend will continue in 2023 and expects more than 1,900 new CVEs to appear each month – a predicted increase of 13% from 2022. Each month Coalition expects an average of 270 high-severity vulnerabilities and 155 critical vulnerabilities to be disclosed and stressed that organizations need to remain vigilant and keep on top of patching and quickly close these security gaps.

With so many vulnerabilities now being reported, keeping on top of patching can be a major challenge. Given the huge number of vulnerabilities security teams need to address, patching is often slow, and that gives hackers a significant window of opportunity to exploit the flaws. Prompt patching is essential, as a majority of newly disclosed CVEs are exploited by cybercriminals within 30 days of the vulnerabilities being made public, with most exploited within 90 days. Exploitation can occur incredibly quickly. For instance, the Fortinet vulnerability, CVE-2022-40684, was exploited within 2 days of the announcement.

Malicious actors typically focus on exploiting a limited set of vulnerabilities. When they discover new vulnerabilities that can be exploited, they tend to stick with their tried and tested exploits and attack as many businesses as possible. While the goal of security teams should be to ensure all vulnerabilities are patched promptly, the huge number of reported vulnerabilities can make that an almost impossible task. The greatest gains can be made by prioritizing patching and ensuring the most commonly exploited vulnerabilities are patched first. The Cybersecurity and Infrastructure Security Agency (CISA) maintains a catalog of known exploited vulnerabilities, and each year publishes a list of the most commonly exploited flaws. All vulnerabilities on these lists should be prioritized and patched first.

Effective prioritization of patching can be a challenge as it is not always clear which vulnerabilities are most likely to be exploited. IT teams often assess vulnerabilities using the Exploit Prediction Scoring System (EPSS) and CVSS severity score, yet this information is not always available when vulnerabilities are first disclosed. Coalition has gotten around this problem by developing the Coalition Exploit Scoring System (CESS), which acts as a scoring system for vulnerabilities. The system uses deep learning models that can predict the CVSS score for a vulnerability based on its description, the likelihood of an exploit being developed quickly based on past exploit availability for CVEs, and the likelihood of exploit usage against Coalition policyholders by modeling past attacks.

“With so many vulnerabilities to address, systems often go unpatched for years, leaving huge swaths of the internet unprotected,” said Coalition in the report.  “Leaders responsible for protecting network security need the most accurate and insightful information to act upon — and they need an effective way to prioritize which CVEs to respond to. We have attempted to provide that necessary context and the CVSS/CESS framework to help cybersecurity leaders and practitioners make informed decisions about their digital risk and react quickly to harmful vulnerabilities.”

The post RDP and Cloud Databases Most Common Targets of Threat Actors appeared first on HIPAA Journal.