📜 ⬆️ ⬇️

Solar JSOC analytics: how Russian companies are attacking

The Cyber ​​Threat Monitoring and Response Center Solar JSOC published a cyber threat study for the first half of 2017, prepared on the basis of impersonal statistics on information security incidents among customers. The received analytics answers the questions about who, how, at what time and with what vectors and channels using the attacks of the largest Russian companies. The report is intended to inform IT services and information security about the current threat landscape and major trends.

In the first half of 2017, the average flow of IS events was 6.156 billion per day, of which about 950 per day were events with suspicion of an incident (172,477 in six months). This is about 28% more than in the first half of 2016. The proportion of critical incidents was 17.2%. Thus, if in 2016 every 9th incident was critical, now it is already every 6th . It is assumed that such dynamics is associated with a general increase in the intensity of massive and targeted attacks against organizations.



When are they attacking?


If we consider the total number of incidents, then only in 12.5% ​​of cases they occurred at night.
')


However, if critical ones are singled out from the total mass of incidents, this figure rises to 29.4%, that is, almost one third of all cases.



If critical incidents were caused by the actions of an external attacker, then in half of the cases (44.6%) they occurred at night.



How to attack from the outside?


The main tools of cybercriminals were attacks on web applications (34.2%), compromising the credentials of external client services (23.6%) and malicious software (19.2%).



Separately, the report notes an increasing number of incidents that are part of the Kill Chain - a chain of sequential actions of a cybercriminal aimed at hacking the infrastructure and compromising key company resources.

In the first half of 2017, Solar JSOC analysts most often (in 87% of cases) encountered the following attack model: after the first penetration phase of the company’s network (statistics are described below, see page 7), attackers try to identify the most vulnerable infrastructure server (often using network scan as an intermediate tool). As such a vulnerable node can act servers with non-updated versions of the operating system. Attackers are trying to seize control of the server in order to gain access to privileged network accounts (technological accounts, records of IT administrators) from which they can secretly gain access to a large number of infrastructure objects as soon as possible.

In 13% of cases, the first step in penetrating a company was an attack on a web application (for example, an online bank), in 25% - on control protocols of systems (including exploiting Shellshock vulnerability, known since September 2014), in 62% - Implementing an organization with malicious software via email attachments or phishing links.



However, often these or other stages of attack development are even easier to implement: for example, passwords from privileged accounts are found on file servers or in the configuration of system control scripts in open form. It is not uncommon for passwords from technological accounts to be written at the domain controller level in the comments (marks) to the UZ itself and are available for reading by the entire organization, which, of course, makes it easier for attackers to gain access to them.

Interesting observations:


How to attack from the inside?


The incidents related to the actions of internal intruders have not changed significantly. In 43.4% of cases, this is information leakage, in 23.5% - compromise of internal accounts, and less than 10% is due to the use of hacking tools, remote administration tools, etc.



Interesting observations:


Analysis of the most “popular” channels of leaks shows that most often employees of companies use email for this purpose (31.7%), web resources (27.2%) and removable media (18.6%).



How to defend?


Technical means

About 67% of the investigated events were recorded using basic IT infrastructure services and basic security tools: firewalls and network equipment, VPN gateways, domain controllers, mail servers, basic security tools (antivirus, proxy servers, intrusion detection systems) . This suggests that the full-fledged operation and high-quality configuration of even the basic means of protection can significantly increase the level of information security of the organization.

At the same time, it is worth noting that the remaining incidents (33.1%), detected using sophisticated intellectual means of protection or analyzing business system events, carry a much larger amount of information that is critical for the company's information and economic security. They allow you to deeper and more fully see the picture of the security of the company and timely prevent critical targeted attacks.

Threat intelligence

Sources of Threat Intelligence used in Solar JSOC can be divided into the following categories:




As you can see, the correct use of free sources of information about TI can increase the security of the company and the resistance to mass attacks. But at least half of the incidents are detected only with the help of paid commercial subscriptions.

Source: https://habr.com/ru/post/338330/


All Articles