Thursday, August 11, 2022
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Cyberattacks Against MSPs Continue to Escalate

Researcher by Researcher
May 12, 2022
in Cybersecurity
0
Cyberattacks Against MSPs Continue to Escalate
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


The U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with cybersecurity authorities from the UK, Australia, Canada and New Zealand, are warning that cybercriminals are increasingly targeting managed service providers (MSPs) in an attempt to compromise their downstream customers.

MSPs deliver and manage platform, software, IT infrastructure and security services, as well as providing business process and support functions for customers. They are part of a partner ecosystem made up of resellers and technology service providers that has been targeted in recent years by threat actors in cyberespionage or ransomware attacks. Because these companies store customer data and support sensitive processes, they are in a unique position where they have trusted network connectivity and privileged access to customer systems.

“Whether the customer’s network environment is on premises or externally hosted, threat actors can use a vulnerable MSP as an initial access vector to multiple victim networks, with globally cascading effects,” according to the joint advisory on Wednesday. “The UK, Australian, Canadian, New Zealand, and U.S. cybersecurity authorities expect malicious cyber actors—including state-sponsored advanced persistent threat (APT) groups—to step up their targeting of MSPs in their efforts to exploit provider-customer network trust relationships.”

While no specific incidents were mentioned as part of the Wednesday advisory, previously actors have successfully exploited the “trusted relationships” in MSP networks in order to gain access to a large number of customers. Luke McNamara, principal analyst with Mandiant, said in recent years researchers have observed a growing focus from some cyber espionage groups – especially Chinese threat actors – on targeting the “information supply chain.”

“A shared commitment to security will reduce risk for both MSPs and their customers, as well as the global ICT community.”

“Managed service providers can be one vector into that and presents an avenue for these actors to compromise trusted partners for the purpose of conducting intrusions into multiple end targets,” said McNamara. “As various espionage groups mature their capabilities, we should expect to continue to see some of these actors prioritize targets that enable them to collect at scale.”

In the well-known July Kaseya attack, attackers leveraged a vulnerability in the software of Kaseya VSA on-premises products in order to execute ransomware attacks against MSPs and their customers. In October, Microsoft warned that Nobelium (the actor behind the SolarWinds intrusion) was compromising resellers and technology service providers in order to target their delegated administrative privileges, which allows admins to delegate administrative responsibilities to partners, including the ability to add users or domains, or reset passwords. Delegated administrative privileges are infrequently audited for approved use, and oftentimes they are not disabled by a service provider or downstream customer once use has ended, making them a lucrative target for cybercriminals.

However, this is just one of many avenues attackers can leverage when targeting a service provider’s environment. Due to the sheer amount data being managed, MSPs and their customers should have “transparent discussions” around how sensitive data is secured and whether MSP-customer contracts identify ownership of security roles and responsibilities, said CISA. Part of these discussions should also include a hard look at supply-chain risk across security, legal and procurement groups.

When it comes to security controls, MSPs should disable accounts that are no longer in use and enforce multi-factor authentication (MFA) on MSP accounts with access to customer environments. MSPs should also ensure that monitoring and logging controls, as well as response and recovery plans, are in place.

“These discussions should result in a re-evaluation of security processes and contractual commitments to accommodate customer risk tolerance,” according to the advisory. “A shared commitment to security will reduce risk for both MSPs and their customers, as well as the global ICT community.”



Source link

Related articles

U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Tags: continueCyberattacksEscalateMSPs
Share76Tweet47

Related Posts

U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
0

“This is something we’re seeing affecting more and more organizations, and it’s likely due to an increasingly crowded market for...

High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
0

Flashpoint is warning organizations of two newly identified critical vulnerabilities in NetModule Router Software (NRSW) that could be exploited in...

Top 5 best backup practices

Top 5 best backup practices

August 10, 2022
0

Give yourself peace of mind by implementing a new backup strategy with our tips. Image: apinan/Adobe Stock You know that...

NVIDIA Fixes High-Severity Flaws in Graphics Drivers For Windows, Linux

Microsoft Fixes Known, Exploited Flaw in Windows Diagnostic Tool

August 10, 2022
0

Microsoft said it fixed a variant of a publicly known vulnerability that was first reported to the company in 2019....

Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
0

A former Twitter worker was found guilty on Tuesday of spying for Saudi officials keen to unmask critics on the...

Load More
  • Trending
  • Comments
  • Latest
Brave browser’s Tor mode exposed users’ dark web activity

Brave browser’s Tor mode exposed users’ dark web activity

February 18, 2022
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022
Makulu Linux Shift makes shifting between desktop layouts easy

Makulu Linux Shift makes shifting between desktop layouts easy

August 10, 2022

Recent Posts

U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access Android attack Attacks banking BiWeekly bug Cisco critical Cyber Cybersecurity Data devices Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest malware Microsoft million Network News open Payments phishing Ransomware RoundUp security Software TFT Threat Top vulnerability warns Week Windows zeroday

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved