{"id":21849,"date":"2023-04-26T08:01:21","date_gmt":"2023-04-26T16:01:21","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/04\/26\/news-15580\/"},"modified":"2023-04-26T08:01:21","modified_gmt":"2023-04-26T16:01:21","slug":"news-15580","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/04\/26\/news-15580\/","title":{"rendered":"Healthy security habits to fight credential breaches: Cyberattack Series"},"content":{"rendered":"<p><strong>Credit to Author: Christine Barrett| Date: Wed, 26 Apr 2023 16:00:00 +0000<\/strong><\/p>\n<p>Fifty percent of Microsoft cybersecurity recovery engagements relate to ransomware,<sup>1<\/sup> and 61 percent of all breaches involve credentials.<sup>2<\/sup> In this second report in our ongoing Cyberattack Series, we look at the steps taken to discover, understand, and respond to a push-bombing request that targeted a legitimate user, allowing an attacker to authenticate and register their own mobile device.<\/p>\n<p>Credential-based attacks begin with the process of stealing or obtaining credentials illegitimately. Often attackers target individuals who they believe have the credentials they need, then conduct social and dark web research on them. Phishing emails and websites created to target corporate targets only need to succeed once to gain credentials that can be sold to and shared with other bad actors.<\/p>\n<p>Push-bombing is when an attacker uses a bot or script to trigger multiple access attempts with stolen or leaked credentials. The attempts trigger a rush of push notifications to the target user\u2019s device, which should be denied. But multiple attempts can confuse a target and cause them to mistakenly allow authentication. Other times, multifactor authentication fatigue can weigh on the target, causing them to believe the access attempts are legitimate. Just one mistaken \u201callow\u201d is all it takes for an attacker to gain access to an organization\u2019s applications, networks, or files.<\/p>\n<p>On average, people receive between 60 and 80 push notifications each day, with some of us viewing more than 200.<sup>3<\/sup> The time it takes to swipe, tap, flag, click, save, and close every ding, buzz, pop-up, text, and tab takes a toll. Researchers believe the onslaught of notifications is causing us to get tired faster and lose focus, leaving us especially prone to distraction as the day wears on.<sup>4<\/sup> This is what attackers count on. If an attacker gains the credentials to operate like a registered, legitimate user, identifying the intrusion and tracing their possible paths of destruction becomes paramount.<\/p>\n<p>Late last year, a large enterprise customer asked <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-incident-response\">Microsoft Incident Response<\/a> to investigate an incursion into their on-premises Active Directory environment. Due to the risk of ongoing threats and the need for continued vigilance, the organization and attacker will be kept anonymous for this incident, and we will refer to it as \u201cthe inCREDible attack.\u201d This credential-based incident highlights the critical need for establishing healthy habits in our security maintenance processes to combat the regular, repeated, and overwhelming credential attacks faced by today\u2019s organizations.<\/p>\n<p>In this report, we examine the factors contributing to the threat actor\u2019s initial incursion and explore what could have happened without prompt, tactical mitigation efforts. Then we detail the required workstreams, recommended timing, and activities involved with regaining control and establishing a plan going forward. We\u2019ll also explore four core steps customers can take to \u201ceat their vegetables\u201d and establish healthy habits that help minimize the risk of attack. And then we share five elements of a defense-in-depth approach that can help businesses maintain a robust defense against ransomware attacks.<\/p>\n<p>Many attacks can be prevented\u2014or at least made more difficult\u2014through the implementation and maintenance of basic security controls. Organizations that &#8220;eat their vegetables&#8221; can strengthen their cybersecurity defenses and better protect against attacks. That means establishing a solid inventory of all technology assets, continually patching operating systems and software, and implementing comprehensive centralized log collection\u2014all while following a well-defined retention policy.<strong> <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RW11L3w\" target=\"_blank\" rel=\"noreferrer noopener\">Read the report<\/a><\/strong> to go deeper into the details of the push-bombing attack, including the response activity, and lessons that other organizations can learn from this inCREDible case.<\/p>\n<h2 class=\"wp-block-heading\">What is the Cyberattack Series?<\/h2>\n<p>With this Cyberattack Series, customers will discover how Microsoft incident responders investigate unique and notable exploits. For each attack story, we will share:<\/p>\n<ul>\n<li>How the attack happened<\/li>\n<li>How the breach was discovered<\/li>\n<li>Microsoft\u2019s investigation and eviction of the threat actor<\/li>\n<li>Strategies to avoid similar attacks<\/li>\n<\/ul>\n<p>Read the first blog in the Cyberattack Series, <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2023\/02\/08\/solving-one-of-nobeliums-most-novel-attacks-cyberattack-series\/\">Solving one of NOBELIUM\u2019s most novel attacks<\/a>. <\/p>\n<h2 class=\"wp-block-heading\">Learn more<\/h2>\n<p>To learn more about Microsoft Incident Response, <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-incident-response\">visit our&nbsp;website<\/a>&nbsp;or reach out to your Microsoft account manager or Premier Support contact.<\/p>\n<p>To learn more about Microsoft Security solutions, visit our&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a>&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and Twitter (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<p><sup>1<\/sup><a href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2213817&amp;clcid=0x409&amp;culture=en-us&amp;country=us\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Digital Defense Report 2022<\/a>, Microsoft. 2022.<\/p>\n<p><sup>2<\/sup><a href=\"https:\/\/enterprise.verizon.com\/en-gb\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noreferrer noopener\">2022 Data Breach Investigation Report<\/a>, Verizon. 2022.<\/p>\n<p><sup>3<\/sup><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0747563219302596\">Batching smartphone notifications can improve well-being<\/a>, Nicholas Fitz, et al. December 2019.<\/p>\n<p><sup>4<\/sup><a href=\"https:\/\/www.discovermagazine.com\/technology\/phone-notifications-are-messing-with-your-brain\" target=\"_blank\" rel=\"noreferrer noopener\">Phone Notifications are Messing with your Brain<\/a>, Molly Glick. April 29, 2022.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/26\/healthy-security-habits-to-fight-credential-breaches-cyberattack-series\/\">Healthy security habits to fight credential breaches: Cyberattack Series<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/26\/healthy-security-habits-to-fight-credential-breaches-cyberattack-series\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christine Barrett| Date: Wed, 26 Apr 2023 16:00:00 +0000<\/strong><\/p>\n<p>This is the second in an ongoing series exploring some of the most notable cases of the Microsoft Incident Response Team. In this story, we\u2019ll explore how organizations can adopt a defense-in-depth security posture to help protect against credential breaches and ransomware attacks.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/26\/healthy-security-habits-to-fight-credential-breaches-cyberattack-series\/\">Healthy security habits to fight credential breaches: Cyberattack Series<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500],"class_list":["post-21849","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21849","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21849"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21849\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21849"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}