Yes we scan Belgium
Miguel De Bruycker
Managing Director General bij Centre for Cyber security Belgium
As a company or organization you don’t become a victim of a ransomware attack because of who you are. It is to say, not primarily. You become a victim because you had a vulnerability and the access to your networks was sold on the Dark Web by an Initial Access Broker. There are two main intrusion vectors that put you on their lists. First they compromise credentials using phishing campaigns or info stealer malware in the browser for instance. Second they scan the Internet for vulnerable systems with unpatched software of configuration mistakes. The Initial Access Broker specializes in compromising credentials or exploiting vulnerabilities without starting the operation to exfiltrate and encrypt data. That is most often done by another group who will look for interesting compromised victims. During this second phase it does matter who and how interesting you are as a target of course.
Decent Multifactor Authentication (MFA) will already protect you significantly against the intrusion by leaked credentials, but how to protect against an intrusion exploiting a vulnerable system? The answer is easier said than done. Even our Cyber Fundamentals level Basic indicates that “Software platforms and applications used within the organization are inventoried”, “Patches and security updates for Operating Systems and critical system components shall be installed”. Most of the time this is done well, but you only have to miss patching one system or one Internet facing software and you are vulnerable.
Government cybersecurity agencies send out generic warnings about vulnerabilities that are being actively exploited, but these warnings have a limited effect. Not many read these warnings and companies do not feel directly addressed or do not sufficiently sense the threat. For new vulnerabilities criminals will develop exploits as fast as possible and will scan the internet for vulnerable systems. Sometimes the access will be secured by installing a backdoor like a Webshell.
At the Centre for Cybersecurity Belgium we go a step further than sending out generic warnings. For almost one year now we have implemented the concept of “spear warning”. Just like criminals do, we identify vulnerable systems in Belgium and notify the owners directly. Spear Warning gains in importance with some important ransomware gangs targeting also mid-sized and even small businesses.
The objective of Spear Warning is to get one step ahead of cybercriminals and identify and protect vulnerable systems before they can attack them.
Spear warning is one of the main missions of our Cyber Threat Research and Intelligence Sharing (CyTRIS) team. There are some distinct step in this process :
One of the hardest parts in setting up a spear warning service on national level was getting all necessary legal provisions. Scanning a network or even a country for vulnerable systems can be seen as an attempt to break in and is therefore by default illegal.? It took us quite some effort to find the right balance and convince the political authorities. We now have the legal mission to detect cyberthreats and vulnerabilities that could lead to significant cyberattacks and damage. Respecting proportionality, only collecting information necessary to identify the vulnerability, with the sole purpose to immediately inform the owner of the vulnerable system we can conduct non-discriminatory and non-intrusive scans.
领英推荐
These five conditions give us just enough authority to already detect a lot of systems in Belgium with an important vulnerability and to notify the owners. Another legislative initiative was needed to allow our CCB to get the identity and the contact information. Thanks to this new legal framework and a constructive collaboration with the Service Providers we can identify and notify most of the companies at risk within a few days after detecting the vulnerability.
The first three quarters of 2023 we were able to send out 8.000 spear warnings. Depending on the vulnerability we can measure a fast reduction ranging from 50% to 90% within days, rather than weeks or months. The effect is significant, even for older vulnerabilities for which several general warnings have already been published.
?Beside the warnings for vulnerabilities we have also started sending out warnings for leaked credentials and for Malware infections that might lead to significant damage. Recently we have sent out 280 spear warnings for SystemBC infections that quite often lead to a ransomware attack. Although we will never know exactly, we can assume that thanks to this campaign we have prevented at least some ransomware incidents.
It took us a few years to have all building blocks in place, but I really think that directly warning the owners of vulnerable or threatened systems is an important service in the whole package of measures that governments can take.
Corporate Affairs Lead at Proximus
11 个月We are a fan of the work of CCB. The spear warning is a great initiative, and we are happy to support all their efforts in the protection of our digital society.
Senior Technical Manager SR at EFRAG
12 个月Miguel De Bruycker proficiat o.a met de Award. Mooie erkenning voor het ganse team.
Manager IT Governance, Risk en Data compliance
12 个月Miguel Zeer mooi initiatief en als extra tip om ook de mensen op C-Level (board niveau) aan te spreken, noem het (be)"Spaar Waarschuwing" klinkt minder technisch.
Identity Governance & Access Management Leader (Comito is hiring)
12 个月Great initiative and have been fortunate enough to experience a -very- close call that avoided disaster by your services! Thank you!
Front runner who gets you from A to B | Cybersecurity specialist driving enterprise & government solution sales at Inetum
12 个月These initiatives together with a mentality to break through difficult information and privacy walls make Belgium #1 ranked in the NCSI. Congrats to the team and the leader!