Tuesday, November 28, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Lapsus$ Analysis Finds Need for Better IAM, MFA Deployments

Researcher by Researcher
August 11, 2023
in Cybersecurity
0
GitHub Begins Mandatory 2FA Rollout for Developers
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


An in-depth analysis of the activities and capabilities of the Lapsus$ hacking and extortion group found that its members mainly used well-known tactics and techniques in its operations and took advantage of known weaknesses in enterprise networks and the procedures of technology providers in order to gain access to targets and steal sensitive data.

Over the course of about two years, Lapsus$ members infiltrated a number of high-profile targets, including Microsoft, Nvidia, and Okta, often using some combination of social engineering, phishing, credential theft, SIM swapping, and MFA-evasion techniques. In a small number of incidents the actors exploited known vulnerabilities, but most of the time, Lapsus$ members favored simple, easy-to-execute attacks to gain access to their targets. A report released Thursday by the Cyber Safety Review Board shows that Lapsus$ actors relied on old fashioned research, reconnaissance, and simple yet effective tactics to exploit procedural and behavioral weaknesses rather than technical ones.

“The threat actors described in this report leveraged a wide diversity of tactics, techniques, and procedures (TTPs), described by researchers as often mixing both non-complex methods and tools with advanced technical knowledge. The threat actors initiated some attacks by employing common phishing methods or leveraging stolen credentials, which they purchased from initial access brokers (IABs).39 Other attacks demonstrated a deeper familiarity with a target’s business and engineering workflows,” the CSRB report says.

“Generally, the threat actors did not deploy custom tools, preferring well-known tools built by others or “living off the land”. The speed of the attacks and the use of different tools and techniques were notable and, in some cases, appeared automated.”

The CSRB was established by the Biden administration in 2022 to conduct in-depth reviews of significant cyber attacks or incidents. The first incident the board looked into was the Log4j vulnerability, which had a widespread effect on organizations across numerous industries. The Lapsus$ operations is the board’s second investigation. The board comprises government and private-sector experts, including Robert Silvers, the undersecretary of the Department of Homeland Security, Heather Adkins, vice president of security engineering at Google, Katie Moussouris, founder and CEO of Luta Security, and Kemba Walden, the acting national cyber director.

One of the key techniques the Lapsus$ actors employed was a combination of reconnaissance, social engineering, and spear phishing to gather information about employees in a target organization and then craft credible phishing emails that point victims to a site that would steal their corporate credentials. In some cases, the actors also used SIM swaps to take over victims’ mobile accounts, or send repeated MFA prompts to the victims until they approve one. All of these are known techniques used by cybercriminals and even some APT groups, and the CSRB members said that enterprises and government agencies need to renew their focus on the security basics while also moving toward more modern architectures and defensive methods.

“The Board found that organizations with mature, defense-in-depth controls were most resilient to these threat actor groups.”

“We need better technologies that move us towards a passwordless world, negating the effects of credential theft. We need telecommunications providers to design and implement processes and systems that keep attackers from hijacking mobile phone service. We need to double down on zero trust architectures that assume breach. We need organizations to design their security programs to cover not only their own information technology environments, but also those of their vendors that host critical data or maintain direct network access.” the report says.

Fortunately, the CSRB found that organizations that have mature security programs and well-designed incident response procedures fared pretty well against Lapsus$ and other similar groups.

“Lapsus$ was not successful in all its attempted attacks. The Board found that organizations with mature, defense-in-depth controls were most resilient to these threat actor groups. Organizations that used application or token-based MFA methods or employed robust network intrusion detection systems, including rapid detection of suspicious account activity, were especially resilient. Organizations that maintained and followed their established incident response procedures significantly mitigated impacts. Highly effective organizations employed mechanisms such as out-of-band communications that allowed incident response professionals to coordinate response efforts without being monitored by the threat actors,” the report says.

The CSRB also recommended that organizations report cyber incidents to law enforcement as soon as possible and continue to share relevant information with CISA and other agencies during an investigation. This helps not only the specific victim organization, but also other potential victims.

“An organization’s decision not to report limits the U.S. government’s ability to take disruptive action, such as the recovery of ransom payments or the decryption of data, either alone or in partnership with foreign and private sector partners,” the report says.

Several alleged members of the Lapsus$ group were arrested in England and Brazil in 2022 and the group has not really been active since.



Source link

Related articles

Sentra Raises $30 Million for DSPM Technology

Northern Ireland’s Top Police Officer Apologizes for ‘Industrial Scale’ Data Breach

August 13, 2023
Minimizing Risk Through Proactive Apple Device Management: Addigy

Minimizing Risk Through Proactive Apple Device Management: Addigy

August 12, 2023
Tags: AnalysisDeploymentsFindsIAMLapsusMFA
Share76Tweet47

Related Posts

Sentra Raises $30 Million for DSPM Technology

Northern Ireland’s Top Police Officer Apologizes for ‘Industrial Scale’ Data Breach

August 13, 2023
0

Northern Ireland’s top police officer apologized Thursday for what he described as an “industrial scale” data breach in which the...

Minimizing Risk Through Proactive Apple Device Management: Addigy

Minimizing Risk Through Proactive Apple Device Management: Addigy

August 12, 2023
0

Enterprise IT teams are struggling to cope with three major forces of change: the evolving regulatory environment, a globally dispersed...

Decipher Podcast: Katelyn Bowden and TC Johnson

Decipher Podcast: Katelyn Bowden and TC Johnson

August 12, 2023
0

Veilid main site: https://veilid.com/ Cult of the Dead Cow site: https://cultdeadcow.com/ Source link

In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack 

In Other News: macOS Security Reports, Keyboard Spying, VPN Vulnerabilities

August 12, 2023
0

SecurityWeek is publishing a weekly cybersecurity roundup that provides a concise compilation of noteworthy stories that might have slipped under...

Used Correctly, Generative AI is a Boon for Cybersecurity

Used Correctly, Generative AI is a Boon for Cybersecurity

August 12, 2023
0

Adobe stock, by Busra At the Black Hat kickoff keynote on Wednesday, Jeff Moss (AKA Dark Tangent), the founder of...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
Microsoft to Block Macros by Default in Office Apps

Qakbot Email Thread Hijacking Attacks Drop Multiple Payloads

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
North Korean Hackers Exploiting Zero-day Vulnerabilities

North Korean Hackers Exploiting Zero-day Vulnerabilities

November 28, 2023
North Korean Hackers Exploit MagicLine4NX Zero-day

North Korean Hackers Exploit MagicLine4NX Zero-day

November 28, 2023
NukeSped Malware Exploiting Apache ActiveMQ Vulnerability

NukeSped Malware Exploiting Apache ActiveMQ Vulnerability

November 28, 2023
A New Telekopye Bots That Tricks Users to Steal Payment Details

A New Telekopye Bots That Tricks Users to Steal Payment Details

November 27, 2023

Recent Posts

North Korean Hackers Exploiting Zero-day Vulnerabilities

North Korean Hackers Exploiting Zero-day Vulnerabilities

November 28, 2023
North Korean Hackers Exploit MagicLine4NX Zero-day

North Korean Hackers Exploit MagicLine4NX Zero-day

November 28, 2023
NukeSped Malware Exploiting Apache ActiveMQ Vulnerability

NukeSped Malware Exploiting Apache ActiveMQ Vulnerability

November 28, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cyber Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved