{"id":23560,"date":"2023-12-09T16:01:18","date_gmt":"2023-12-10T00:01:18","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/12\/09\/news-17290\/"},"modified":"2023-12-09T16:01:18","modified_gmt":"2023-12-10T00:01:18","slug":"news-17290","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/12\/09\/news-17290\/","title":{"rendered":"Protecting credentials against social engineering: Cyberattack Series"},"content":{"rendered":"<p><strong>Credit to Author: Microsoft Incident Response| Date: Mon, 04 Dec 2023 17:00:00 +0000<\/strong><\/p>\n<p>Our story begins with a customer whose help desk unwittingly assisted a threat actor posing as a credentialed employee. In this <a href=\"https:\/\/www.microsoft.com\/content\/dam\/microsoft\/final\/en-us\/microsoft-brand\/documents\/ms-security-experts-cyberattack-series-part-4-octo-tempest-final.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">fourth report in our ongoing Cyberattack Series<\/a>, we look at the steps taken to discover, understand, and respond to a credential phishing and smishing (text-based phishing) cyberattack that targeted a legitimate, highly-privileged user with social engineering\u2014allowing the cyberattacker to impersonate the victim and weaponize a help desk to remove their multifactor authenticated device and register their own.<\/p>\n<h2 class=\"wp-block-heading\">Highly privileged users at risk<\/h2>\n<p>Credential-based cyberattacks often begin with cyberthreat actors targeting individuals who they believe are connected to the people who have the credentials they need. Then they conduct social and dark web reconnaissance to find and wind their way to highly privileged users and gain enough information to impersonate them. In the past, cyberthreat actors have even been known to impersonate and masquerade as staff, including chief information security officers (CISOs) and other incident response firms. Cybercriminals use trust, context, and emotion to trick people with smishing links. At that point, they don\u2019t need to hack, they just log in. Many smishing and social engineering attacks employ a rush of push notifications that can overwhelm or confuse a target, causing multifactor authentication fatigue. Researchers believe the onslaught of notifications is causing us to get tired faster and lose focus, leaving us especially prone to distraction as the day wears on.<sup>1<\/sup> All the pings, clicks, swipes, buzzes, texts, and taps can weigh on a target, causing them to believe an access attempt is legitimate. And cyberthreat actors don\u2019t let up. By the end of June 2023, we observed approximately 6,000 multifactor authentication fatigue attempts\u2014per day\u2014every day.<sup>2<\/sup><\/p>\n<div class=\"wp-block-msxcm-kicker-container align-right\">\n<div class=\" wp-block-msxcm-kicker wp-block-msxcm-kicker--align-right\" data-bi-an=\"Kicker Right\">\n<p class=\"wp-block-msxcm-kicker__title text-neutral-600 text-uppercase\"> \t\t\tWhat is smishing?\t\t<\/p>\n<p> \t\t<a \t\t\tclass=\"wp-block-msxcm-kicker__cta btn btn-link p-0 text-decoration-none\" \t\t\thref=\"https:\/\/www.microsoft.com\/security\/business\/security-101\/what-is-phishing\" \t\t\ttarget=\"_blank\"> \t\t\t<span>Learn the different types of phishing attacks<\/span>&nbsp;<span class=\"glyph-append glyph-append-xsmall wp-block-msxcm-kicker__glyph glyph-append-go\"><\/span> \t\t<\/a> \t<\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\">Untangling the tentacles of a cyberattack<\/h2>\n<p>In the case of threat actor Octo Tempest, once they gained access, they began wrapping their tentacles around valuable assets and collecting additional credentials by using third-party credential-harvesting tools against cloud and on-premises assets. They searched through the customer\u2019s SharePoint and email system for sensitive information about IT processes and VPN architecture. Then they modified the normal authentication flow, which allowed them to authenticate as any user in the organization, without requiring their credentials.<\/p>\n<p>In this report, we examine the factors contributing to the cyberthreat actor\u2019s initial incursion and explore what could have happened without prompt tactical mitigation efforts. We walk through mitigation efforts step by step. Then we examine Octo Tempest\u2019s tactics, techniques, and procedures (TTPs) to understand the extent of the compromise and how we were able to help the customer evict the cyberthreat actor completely. We\u2019ll also explore how organizations can educate employees to reduce the chance of social engineering attacks, and share five proactive elements of a <a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust\">Zero Trust<\/a> approach that can protect against highly motivated, tenacious cyberthreat actors like Octo Tempest.<\/p>\n<h2 class=\"wp-block-heading\">Preventing cyberattacks<\/h2>\n<p>Many cyberattacks can be prevented\u2014or at least made more difficult to execute\u2014through the implementation and maintenance of basic security controls. Organizations can strengthen their cybersecurity defenses and better protect against cyberattacks by understanding in-depth the tentacles of a far-reaching credential breach like this one. <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-incident-response\">Microsoft Incident Response<\/a> can provide expert guidance to customers when an attack becomes too complex and challenging to mitigate alone\u2014and before an attack happens\u2014to develop a comprehensive incident response plan and ensure security personnel are trained to recognize and respond to social engineering attacks. With Microsoft\u2019s intelligence-driven incident response, customers can access the help they need on a global scale with global incident response, all day, every day\u2014both on-site and remotely. The proactive and reactive incident response services let customers take advantage of the depth and breadth of Microsoft Threat Intelligence and gain unique access to product engineering. It also means customers can benefit from the longstanding Microsoft partnerships with government agencies and global security organizations for the latest, most comprehensive intelligence available.<strong>\u00a0<a href=\"https:\/\/www.microsoft.com\/content\/dam\/microsoft\/final\/en-us\/microsoft-brand\/documents\/ms-security-experts-cyberattack-series-part-4-octo-tempest-final.pdf\">Read the report<\/a><\/strong>\u00a0to learn more about the cyberattack, including the response activity, and lessons that other organizations can learn to avoid being caught in the tentacles of a social engineering compromise.<\/p>\n<h2 class=\"wp-block-heading\">What is the Cyberattack Series?<\/h2>\n<p>With this Cyberattack Series, customers will discover how Microsoft incident responders investigate unique and notable exploits. For each cyberattack story, we will share:<\/p>\n<ul>\n<li>How the cyberattack happened.<\/li>\n<li>How the breach was discovered.<\/li>\n<li>Microsoft\u2019s investigation and eviction of the cyberthreat actor.<\/li>\n<li>Strategies to avoid similar cyberattacks.<\/li>\n<\/ul>\n<p>Read the first blog in the Cyberattack Series,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/02\/08\/solving-one-of-nobeliums-most-novel-attacks-cyberattack-series\/\">Solving one of NOBELIUM\u2019s most novel attacks<\/a>.<\/p>\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters material-color-brand-dark\">\n<div class=\"col-md-4\"> \t\t\t\t\t<img loading=\"lazy\" width=\"1024\" height=\"683\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Peach-Sandstorm-featured-image-2-1024x683.jpg\" class=\"card-img img-object-cover\" alt=\"Three security experts looking at a computer.\" decoding=\"async\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Peach-Sandstorm-featured-image-2-1024x683.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Peach-Sandstorm-featured-image-2-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Peach-Sandstorm-featured-image-2-768x512.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/Peach-Sandstorm-featured-image-2.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<\/div>\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\">\n<h2>Microsoft Incident Response<\/h2>\n<div class=\"mb-3\">\n<p>Strengthen your security with an end-to-end portfolio of proactive and reactive incident response services.<\/p>\n<\/p><\/div>\n<div class=\"link-group\"> \t\t\t\t\t\t\t<a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-incident-response\" class=\"btn btn-primary bg-body text-body\" > \t\t\t\t\t\t\t\t<span>Explore services<\/span> \t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span> \t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\">Learn more<\/h2>\n<p>To learn more about Microsoft Incident Response,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-incident-response\">visit our&nbsp;website<\/a>&nbsp;or reach out to your Microsoft account manager or Premier Support contact. Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\">Microsoft Security<\/a>) and Twitter (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<p><sup>1<\/sup><a href=\"https:\/\/www.discovermagazine.com\/technology\/phone-notifications-are-messing-with-your-brain\" target=\"_blank\" rel=\"noreferrer noopener\">Phone Notifications Are Messing With Your Brain<\/a>, Discover Magazine. April 29, 2022.<\/p>\n<p><sup>2<\/sup><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/microsoft-digital-defense-report-2023\">Microsoft Digital Defense Report 2023<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/12\/04\/protecting-credentials-against-social-engineering-cyberattack-series\/\">Protecting credentials against social engineering: Cyberattack Series<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/12\/04\/protecting-credentials-against-social-engineering-cyberattack-series\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Microsoft Incident Response| Date: Mon, 04 Dec 2023 17:00:00 +0000<\/strong><\/p>\n<p>Our fourth installation in the Cyberattack Series examines a smishing and social engineering attack and outlines the steps organizations can take to help minimize the risk and prepare for the possibility.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/12\/04\/protecting-credentials-against-social-engineering-cyberattack-series\/\">Protecting credentials against social engineering: Cyberattack Series<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-23560","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23560"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23560\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}