Most Common Attack Vectors
Most Common Attack Vectors
2
Attack surface, attack vectors,
and breaches defined
Regardless of business or industry, here are three key terms that lie
at the heart of every enterprise’s cyber-defenses:
3
Cyber-attacks 101
Here is a list of today’s most frequently launched attacks and the breach methods they use.
Compromised credentials
Compromised credentials describe a case And it is not only humans who hold credentials.
where user credentials, such as usernames and Servers, network devices and security tools often
passwords, are exposed to unauthorized entities. have passwords that enable integration and
This typically happens when unsuspecting users communication between devices. In the hands of
fall prey to phishing attempts and enter their login an intruder, these machine-to-machine credentials
credentials on fake websites. Privileged access can allow movement throughout the enterprise,
credentials, which give administrative access both vertically and horizontally, giving almost
to devices and systems, typically pose a higher unfettered access.
risk to the enterprise than consumer credentials.
4
Weak and stolen credentials
Weak passwords and password Apps and protocols sending login were able to steal Active
reuse make credential exposure credentials over your network Directory credentials and
a gateway for initial attacker pose a significant security threat. propagate their attack into the
access and propagation. An attacker connected to your enterprise payment network.
Malware attacks such as Mirai network can easily locate and
highlight this threat not only for utilize these credentials for
managed devices but also IoT lateral movement. For example,
connected devices. in the Target attack, adversaries
5
Malicious insiders
A malicious insider is an employee who exposes private
company information and/or exploits company vulnerabilities.
Malicious insiders are often unhappy employees. Users with
access to sensitive data and networks can inflict extensive
damage through privileged misuse and malicious intent.
6
Missing/poor encryption
DO THIS TO
Data encryption translates data into another form that only people
AVOID IT:
with access to a secret key or password can read. Encrypted data is
commonly referred to as ciphertext, while unencrypted data is called • Don’t rely solely on low-
plaintext. The purpose of data encryption is to protect digital data level encryption or assume
confidentiality as it is stored on computer systems and transmitted using that following compliance
means that the data is
the internet or other computer networks. Strong encryption must be securely encrypted.
applied to data at rest, in-motion, and where suitable, in-processing.
• Ensure that sensitive data
is encrypted at rest, in-
Missing / poor encryption leads to sensitive information including transit, and in processing.
credentials being transmitted either in plaintext, or using weak
cryptographic ciphers or protocols. This implies that an adversary
intercepting data storage, communication, or processing could get
access to sensitive data using brute-force approaches to break
weak encryption.
7
Misconfiguration
Misconfiguration is when there is an error in system configuration.
For example, if setup pages are enabled or a user uses default
usernames and passwords, this can lead to breaches. With
setup/app server configuration not disabled, the hacker can
determine hidden flaws, and this provides them with extra
information. Misconfigured devices and apps present an easy
entry point for an attacker to exploit.
DO THIS TO
AVOID IT:
• Put procedures and systems
in place that tighten your
configuration process and use
automation wherever possible.
Monitoring application and
device settings and comparing
these to recommended best
practices reveals the threat for
misconfigured devices located
across your network.
8
Ransomware
Ransomware is a form of cyber-extortion in which users are
unable to access their data until a ransom is paid. Users are
shown instructions for how to pay a fee to get the decryption
key. The costs can range from a few hundred dollars to
thousands, payable to cybercriminals in Bitcoin.
9
Phishing
Phishing is a cybercrime tactic in which the targets are contacted
by email, telephone or text message by someone posing as a
legitimate institution to lure individuals into providing sensitive
data such as personally identifiable information, banking and
credit card details, and passwords. It continues to be one of
the most effective social engineering attack vectors.
DO THIS TO
AVOID IT:
• Measuring web browsing and
email click-through behavior
for users and devices provides
valuable risk insight for your
enterprise.
10
Trust relationships
DO THIS TO
Trust relationships refer to a certain level of trust that exists between
AVOID IT:
users and systems. For example, trust relationships can connect
two domains, so a user only has to log in once in order to access • Managing trust
resources. The two domains in a trust relationship are the trusted relationships can help
domain (the domain that authenticates the user the first time), and you limit or eliminate the
impact or damage an
the trusting domain (the domain that relies on the trusted domain attacker can inflict.
to authenticate users and gives access to its resources without Google’s BeyondCorp is
re-authenticating the user). One common breach scenario example an example of zero-trust
security practice.
is when credentials are cached on the trusted client, which then
gets breached, wreaking havoc.
11
OTHER BREACH METHODS:
Zero-day vulnerabilities
This is a vulnerability that nobody is aware of until the breach
happens (hence the name zero day, as there is no time elapsed
between when the attack happens, and the vulnerability is made
public). If a developer has not released a patch for the zero-
day vulnerability before a hacker exploits that vulnerability,
then the following attack is known as a zero-day attack.
Having the red team write POC exploits is a way to mitigate
zero-day vulnerabilities.
DDoS
Distributed Denial of Service (DDoS) is a cyberattack against
a network resource (e.g., server, website) by numerous
compromised computer systems. The network resource is
flooded with extraneous messages, which causes the target to
slow down and/or crash, making it inaccessible to authorized
users and systems. A DDoS attack normally occurs due to
multiple systems being compromised. A potential mitigation
method for this is to use CDNs, reverse proxies, HA proxies,
etc. that put layers of defense in between systems serving
content and clients requesting content.
12
Four exposures 1 High-risk software components such as
to keep on your Java, Flash, and IE are prone to zero-day
attacks due to a large number of inherent
radar screen vulnerabilities—many of which are not
publicly disclosed. Devices containing
such high-risk software that are actively
exposed to the web are especially prone
to attack.
13
Balbix uses deep learning
and advanced AI algorithms
to enable you to:
Understand your attack surface. Balbix continuously observes
your extended enterprise network inside-out and outside-in,
to discover the attack surface and analyze the hundreds of
millions (or more) of data points that impact your risk.
14
Conclusion
The ultimate goal of adversaries and malicious insiders is to access your high value devices,
apps, and data. Left unsecured, devices and users with access to sensitive apps, data, and
networks will pose a significant risk to your enterprise.
To stay ahead of the bad guys, you need to start by understanding your vulnerabilities,
knowing the many ways your defenses can be breached, and then putting in place the
protections needed to maintain a secure, resilient cybersecurity posture. Keeping the
attack surface as small as possible should be considered a basic security measure. Also
managing trust relationships can help you limit or eliminate the impact or damage an
attacker can inflict.
LEARN MORE