Rotten Fruit: 4 Insider Threats to Watch Out For

  /     /     /  
Publicated : 23/11/2024   Category : security


Rotten Fruit: 4 Insider Threats to Watch Out For


When it comes to insider threats, its best not to trust anyone. However, different employees pose different types of threats to the network. Here are the four types of rotten fruit to look out for in your business.



That woman who sits across the hall from you? Dont trust her. The young man in the cubicle near the IT departments break room? Dont trust him. The gray-haired woman who runs the quarterly sales meetings? Dont trust. That really, really tall bald guy in HR? Dont trust.
Even though they are employees or contractors, you should not trust. In fact,
because
they are employees or contractors, you must not trust.
There are three main types of dangerous insiders -- well, four, as well get into in a moment.
But first, insiders have an advantage over external hackers and bad actors: They are authorized to be inside your building, on your network. They dont need to spoof an email address -- @yourcompany.com -- because they have one, quite legitimately. They were given a Single Sign-On (SSO) account and maybe a VPN account to access the network from home.
They know the WiFi passwords because they were given those passwords. Official badges or keys let them into the building nights and weekends.
In other words, insiders have overcome one huge technological barrier facing external attackers: gaining that initial foothold, either over the network or through physical access.
(Source:
iStock
)
Insiders have another advantage, as their presence and actions wont be noticed or questioned, as long as they dont do anything significantly unusual or overtly threatening.
Insiders represent a genuine risk. According to the well-respected
Verizon Data Breach Investigations Report 2018
:

The majority of data breaches that we have seen during this period involve some form of insider component. As a result of the level of access often afforded to insiders and with the luxury of the time that they have to extract data, the average volume of data taken per breach still remains unacceptably high.

Verizon reports that in some sectors, such as healthcare, government and education, naughty insiders represent a huge proportion of causal actors in data breaches. In fact, more than half --56% -- of healthcare incidents involved an insider, sometimes working alone, sometimes with an external partner.
The Healthcare industry has the dubious distinction of being the only vertical that has a greater insider threat (when looking at breaches) than it does an external threat, according to Verizon. Ouch.
Lets talk about the three (or is it four?) types of insiders. As with external hackers, each type of insider has a different motivation and poses its own risk... and you may want to have separate plans for detecting and remediating the damage caused by each group.
Really bad apples
: These are insiders that actively wish to do harm to the business or organization. Maybe theyre angry about not getting a promotion and want revenge by sabotaging information systems. Maybe theyve decided to make money by selling data to a competitor or foreign government, or by doing some insider trading before the latest earning release. Maybe theyre being blackmailed. Who knows?
The bad apples have motivation, and possibly have specific objectives, such as exfiltrating design documents or accessing financials. They may have expert assistance, as well as access to sophisticated tools. Youll need to access tools like intrusion detection and prevention systems (IDPS), watch for data theft by monitoring everything from USB ports to email accounts and lock down networks against unauthorized devices. Log analysis is key. Good luck.
Well-meaning but overzealous oranges
: These are employees who believe they can work more efficiently -- and help the business -- by taking some shortcuts. Its easier to set up a Dropbox or Google Drive storage account on their own than to ask for permission, they think -- even though theres a corporate policy against it. They set up remote access to their work PC from home, even though that’s not allowed. They share logins and passwords to secure systems with coworkers, because it’s faster than asking permission.
The easy answer here is training, but the reality is, they wont care what you have to say. These folks are so well-meaning that nothing will deter them from breaching your systems and subverting your policies. The harder solutions involve blocking access to unauthorized software or cloud services, as well as making it easy to provision new authorized access to approved systems. Take down the barriers to productivity, and those employees wont go around those barriers.
Careless pineapples
: Call them stupid, but Id prefer to call them untrained: Were talking about employees who dont use two-factor authentication (2FA) on their smartphones, who forget to secure a database stored on Amazon Web Services or Microsoft Azure, who download customer account information to their laptops -- which are then left in a taxi -- who assign the wrong privileges to an application, or who fail to test a web application against cross-site scripting (XSS) attacks before making the application live.
The only way to control careless pineapples is to use the same methods that the military uses for launching missiles: Strong controls. Require two employees sign-off to push new code out to a live web server. Mandate the use of 2FA on all accounts and mobile devices, and force the use of strong passwords. Check the security defaults for IaaS/PaaS services, and conduct regular audits of those services. Dont allow new code to be checked into the repository without passing all the
Open Web Application Security Project
(OWASP) tests. Its not enough to have strong security policies -- those policies must be enforced.
False fruit
: It may be difficult to detect when something bad is being done by an employee -- or when that employees technology has been breached, and its actually an external actor using that Android phone, MacBook Pro or cloud service. Just because someone has a valid login and password, and is calling in from a device or using an application protected by 2FA, doesnt mean thats truly your employee. It could be a stolen device, data captured by a keylogger or a clever hack.
The only solution: trust nobody.
Related posts:
Data Breaches Costing More C-Level Executives Their Jobs
Verizon Offers Look Inside Data Breach Investigations
Second Equifax Employee Facing Insider Trading Charges
IBMs USB Ban Earns Some Praise, Some Skepticism

Alan Zeichick is principal analyst at
Camden Associates
, a technology consultancy in Phoenix, Arizona, specializing in enterprise networking, cybersecurity, and software development. Follow him
@zeichick
.

Last News

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security

▸ Criminal Possession of Government-Grade Stealth Malware ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Rotten Fruit: 4 Insider Threats to Watch Out For