Five Places Hackers Are Discreetly Stealing Your Data

Five Places Hackers Are Discreetly Stealing Your Data

We’re all-too accustomed to handing over our data to service providers; be it financial institutions or entertainment providers, the practice of handing over sensitive personally-identifiable information (PII) is commonplace. The same too can apply to organisations that are responsible for keeping this data safe, however, complacency in this particular area can prove disastrous, as authors of the Stealth Report have pointed out in their latest publication. “Skyrocketing data breaches bring incalculable losses to organizations can cost cybersecurity executives their jobs,” they state, adding that the purpose of their latest report was to “examine the top five places in 2019 where cybercriminals are stealing corporate and government data without ever getting noticed and then learn how to avoid falling victim to unscrupulous attackers.” 

“Many organisations are hacked every day without being aware of this due to the complexity of the attacks or simple negligence, lack of resources or skills.” 

Misconfigured Cloud Storage

According to the report, “48% of all corporate data is stored in the cloud, compared to 35 three years ago according to a 2019 Global Cloud Security Study by Thales that surveyed over 3,000 professionals across the globe. Contrastingly, only 32% of organisations believe that protecting data in the cloud is their own responsibility, counting on cloud and IaaS providers to safeguard the data. Worst, 51% of the organisations do not use encryption or tokenization in the cloud.” 

Authors of the report also mention research put forward by (ISC)2’s 2019 Cloud Security Report which states that 64% of cybersecurity professionals believe data loss and leakage are the biggest risks with cloud storage. “Misuse of employee credentials and improper access controls are the top challenges for 42% of professionals, while 34% struggle with compliance in the cloud, and 33% name lack o visibility into infrastructure security as their predominant concern.” 

The report also cites Facebook, Microsoft and Toyota as victims that were “mercilessly stigmatized by the media or losing millions of customer records due to third-party leaks or breaches.” Despite the warnings, “few organizations have a well-thought, properly implemented, and continuously enforced third-party risk management program, most relying on paper-based questionnaires skipping practical verifications and continuous monitoring,” the report says. 

How to mitigate: “Train your team, implement an organisation-wide cloud security policy, continuously run discovery of public cloud storage to maintain an up-to-date inventory of your cloud infrastructure.” 

The Dark Web

Earlier this year, Troy Hunt, a security expert released ‘Notorious Dump #1’, which was a set of email addresses and passwords set in plain-text which totaled nearly 2.7 billion rows of data. The extremely valuable treasure-trove of data was accessible to anyone willing to part with their bitcoin, and is one of the largest publicly-known databases in existence. “Many organisations are hacked every day without being aware of this due to the complexity of the attacks or simple negligence, lack of resources or skills.”  

“Targeted password re-use attacks and spear phishing are simple to launch and do not require expensive zero-day exploits. Although trivial at first glance, they may be piercingly efficient. Most organisations do not have a consistent password policy across their corporate resources, deploying SSO only to their critical infrastructure.” The report also states that “given the multitude of such portals and resources, attackers meticulously try stolen credentials and eventually get what they seek.” 

How To Mitigate: “ensure digital assets visibility, implement holistic password policy and incident response plan, continuously monitor Dark Web and other resources for leaks and incidents.” 

Abandoned and Unprotected Websites

Research published by ImmuniWeb this year claimed that 97 out of 100 of the world’s largest banks have vulnerable websites and web applications. The same report mentions that 25% of e-banking apps weren’t protected with a web-application-firewall (WAF) and 85% of these applications failed the GDPR compliance tests. “In spite of the rise of attack surface management solutions, the majority of businesses incrementally struggle with the growing complexity and fluctuating intricacy of their external attack surfaces. Web applications dominate the list of abandoned or unknown assets being left by careless or overloaded developers,” the Threat Report states.

“With some exceptions, vendors are sluggish to release security patches compared to the speed of mass-hacking campaigns.”

“Even properly deployed web applications may be a time bomb if left unattended. Both open-source and proprietary software make a buzz in Bugtraq with remarkable frequency bringing new and predominantly easily-exploitable security flaws. With some exceptions, vendors are sluggish to release security patches compared to the speed of mass-hacking campaigns.” The report also makes an example of Wordpress, a popular CMS site, which are “comparatively safe in their default installations, but the myriad of third-party plugins, themes and extensions annihilate their security.” 

How To Mitigate: “start with a free website security test for all your external-facing websites and continue with in-dept web penetration testing for the most critical web application and APIs.” 

Mobile Applications’ Backends

While the report states that “modern businesses now generously invest in mobile application security, leveraging secure coding standards… most of these solutions tackle only the visible tip of the iceberg, leaving mobile application backend untested and unprotected.” 

According to the authors, “while most of the APIs used by the mobile application send or receive sensitive data, including confidential information, their privacy and security are widely forgotten or deprioritized, leading to unpardonable consequences. Likewise, large organizations commonly forget that previous versions of their mobile apps can be easily downloaded from the internet and reverse-engineered. Such legacy applications are true Klondie for hackers searching for abandoned and vulnerable APIs commonly still capable of providing access to an organization’s crown jewels in an uncontrolled manner.” 

How to Mitigate: “build holistic API inventory, implement software testing policy, run a free mobile app security test on all your mobile apps and backends, conduct mobile penetration testing for critical ones.” 

Public Code Repositories

Public code repositories are often the weakest link that undermines an organisation’s ability to stay protected online. The report cites a recent example of Scotiabank, that reportedly stored extremely sensitive data in a publicly-accessible GitHub repository, which exposed its internal source code, login credentials and confidential access keys.

Cheap software is obviously not without substantial drawbacks, and poor security tops them,”

“Third-party software developers considerably exacerbate the situation in an attempt to provide the most competitive quote to unwitting and somewhat naive customers. Cheap software is obviously not without substantial drawbacks, and poor security tops them,” the report states. 

“Human mistakes unsurprisingly predominate the space. Even exemplary organizations with mature and proof-tested security policies awkwardly slip because of human factors. Tough deadlines dictated by economic realities lead to overburdened an exhausted programmers who innocently forget to set a proper attitude on a newly created repository letting the troubles in.”   

How To Mitigate: “implement a policy addressing code storage and access management, enforce it internally and for third-parties, continuously run public code repositories monitoring for leaks,” the report states, adding that “following this mitigation advice may save you countless sleepless nights and many millions for your organization. Lastly, do share information about Attack Surface Management (ASM) with your industry peers to enhance their security awareness and cybersecurity resilience.” 






要查看或添加评论,请登录

Kobi Simmat的更多文章

  • How ISO 27001 Certification Can Benefit Your Business

    How ISO 27001 Certification Can Benefit Your Business

    In today’s business climate, cybersecurity threats are becoming a much more significant issue, with large Australian…

    2 条评论
  • 4 Reasons Why 2023 Is The Year You Write Yourself A Mission Statement

    4 Reasons Why 2023 Is The Year You Write Yourself A Mission Statement

    Are you in a rut? Are you stuck at the same place in your career? Have you been feeling like something is missing?…

    1 条评论
  • 5 Tips On Transitioning Into A New Industry

    5 Tips On Transitioning Into A New Industry

    A career change can be a scary prospect. It means putting yourself out there, learning new skills and potentially…

    4 条评论
  • How To Bounce Back After Losing A Client

    How To Bounce Back After Losing A Client

    Losing a client is tough. It might feel like the end of the world, but there’s no need to panic.

    11 条评论
  • What Does It Mean To Be A Mindful Leader?

    What Does It Mean To Be A Mindful Leader?

    Mindful leadership, in a sense, is about more than just being a good leader. It’s about being a good listener and…

    4 条评论
  • How The Metaverse Could Benefit Your Business

    How The Metaverse Could Benefit Your Business

    The concept of the metaverse and what it means for business going forward into the future can be a hard concept to…

    7 条评论
  • Why You Should Have ISO Certification

    Why You Should Have ISO Certification

    The International Organisation for Standardisation (ISO) has established specifications to enhance the quality and…

    4 条评论
  • What Are The ISO 27001 Changes In 2022?

    What Are The ISO 27001 Changes In 2022?

    The information security management standard ISO 27001 was first published in 2005. It was revised in 2013 and has been…

    7 条评论
  • How To Set The Right Business Goals

    How To Set The Right Business Goals

    To create change today for tomorrow,” Barry Magliarditi, founder and director of The Game Changers explains. “Business…

    5 条评论
  • Why You Should Prioritise Learning And Development At Work

    Why You Should Prioritise Learning And Development At Work

    Learning and development is the key to unlocking your career potential. It has never been more important for you to…

    7 条评论

社区洞察

其他会员也浏览了