SANS Institute, in its recent survey titled ‘SANS 2017 Endpoint Risks and Protections’, revealed that browser-based attacks and social engineering are now the two most powerful techniques targeting organisations.
According to the firm, both techniques prey upon users as their initial point of entry.
“Cybercriminals are going after the weakest link- the employee. Unfortunately for organisations, this means that even after they have invested heavily in IT security technologies, poor security awareness among employees can still result in their systems being breached,” explained Ned Baltagi, managing director, Middle East and Africa, SANS. “Social exploits are becoming more sophisticated than ever before and even employees with the best intentions, can severely compromise the cybersecurity of their organisations.”
While users represent the top target leveraged by attackers, vulnerabilities such as misconfigurations or software flaws were also commonly leveraged in attacks against the endpoints, ranking as the third most common source of significant compromise, according to survey respondents. Such vulnerabilities have been responsible for a number of large-scale attacks including the very recent and infamous WannaCry which is considered to be the most successful ransomware campaign to date.
According to the survey, 53 percent of respondents have knowledge of impactful compromises starting at their endpoints in the past 24 months. And that total doesn’t include the 37 percent who don’t know whether they’ve been compromised or not during that timeframe.
Of the 53 percent of significant breaches that respondents knew about, just 48 percent were detected through endpoint detection and response (EDR) solutions. The remainder of detections were not directly from endpoint solutions, and included such sources as log analysis, security information and event management (SIEM) system alerts, cloud-based monitoring, and even third-party notification.
“The farther from the endpoint a breach is discovered, the more time it has to pivot from system to system and increase the impact of the breach,” said SANS Analyst G.W. Ray Davidson who authored the report. “As organisations develop sufficient maturity, they should automate remediation activities as much as possible, because the scope of a breach can quickly outpace remediation efforts.”
“Organisations must devote more resources to user education and to monitoring activities that result from user behaviour,” said Davidson. “The insider threat is no longer just the malicious actor with unauthorised access; well-intentioned but naive employees can be just as dangerous.”