Social Engineering Leads APT Attack Vectors

  /     /     /  
Publicated : 22/11/2024   Category : security


Social Engineering Leads APT Attack Vectors


Combat advanced persistent threats with more adaptive user training and by acknowledging that networks today exist in a state of constant compromise, say experts.



(click image for larger view)
Slideshow: 10 Massive Security Breaches
The number-one advanced persistent threat (APT) attack vector is now not technology, but social engineering. Furthermore, security is no longer about trying to keep all intruders outside of the network perimeter, but rather acknowledging that security today involves living in a state of constant compromise.
Those are some key findings that came out of a summit held in Washington last week by RSA, the security division of EMC, as well as
TechAmerica
, a technology trade association. The summit involved about 100 c-level managers--CIOs, CTOs, and a few CEOs--plus senior lawyers, all drawn from large, well-known businesses and government agencies, who were gathered to discuss the best way to
combat APTs
.
It wasnt some vendor-driven thing, said Eddie Schwartz, CSO of RSA, in an interview. Rather, he said, it was aimed at updating current approaches to security, in light of the types of advanced--and oftentimes, persistent and hard-to-detect--threats that have successfully exploited numerous organizations,
including RSA
.
One of the summits major findings is that
social engineering attacks
are now the primary threat vector used to compromise businesses and government agencies. But as employees have become much more of a risk, what hasnt changed, said Schwartz, is the degree to which anything had been done about it, or investments shifted, or program emphasis shifted, versus just spending money on perimeter security technologies.
Another interesting finding from the summit was that many businesses and government agencies said that while pursuing a zero breach tolerance approach was nice in theory, its now unrealistic. A more realistic [approach] would be accepting the fact that you live in a world of compromise, and understanding that you have to work in that world, and work in a mode of triage, instead of constantly trying to push back hordes at the gate, said Schwartz.
One driver for that more pragmatic worldview has been the emergence of
targeted malware
that is, in some cases, just hours old. Combating this type of APT can be incredibly difficult, because all it takes is one employee to open a seemingly innocuous--yet really malicious--attachment, and the business can be compromised.
Attackers ability to hit big businesses and government agencies with never-before-seen malware implies that attackers often benefit from
significant resources
. This increased agility on the part of attackers shows a very high level of resources available to them, where they can have people who are very responsive to the defenses of large organization ... and be able to work around those organizations on a case by case basis, said Schwartz. So theyre highly focused, and very agile to what the target is trying to do to defend itself.
What can be done to deal with these types of attacks? Given the threat posed by social engineering, Schwartz said that one of the more innovative--and adaptive--approaches described was wargaming, in which employees face real-world tests, such as their ability to avoid a
spear-phishing attack
. Fail the test, and theyre called into a room to see, as a group, what the consequences of that attack would have been--both for them, and their employer.
Another strategy that could help organizations better resist APTs would be some form of information sharing, such as crowdsourcing attack data. Todays attackers are better at real-time intelligence sharing than we, the targets are. In other words, theyre better at gathering open source intelligence about us, organizing the data, and collaborating with each other, than we are at defending ourselves, said Schwartz.
Unfortunately, sharing information between defenders faces numerous hurdles, including the need for indemnification against liability, some sort of underlying technical infrastructure, as well as the current lack of a standard set of nouns, verbs, and adjectives to describe security attacks, said Schwartz. Really, there arent these types of lexicons today for communicating at machine speed about these types of problems.
Security professionals often view compliance as a burden, but it doesnt have to be that way. In this report, we show the security team how to partner with the compliance pros.
Download the report here
. (Free registration required.)

Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Social Engineering Leads APT Attack Vectors