InfoGuard’s Cyber Threat Intelligence (CTI) team fulfils various tasks for its own protection and that of our customers. Of central importance: the identification of tendencies and trends of cyber attackers. In this article, we take a look back at the 53 largest cases handled by InfoGuard’s Computer Security Incident Response Team (CSIRT) last year with the aim of being even better prepared in 2023. With the aid of a threat landscape assessment, we can arrive at possible priorities and more optimal security investments.
An important part of our work as a Cyber Threat Intelligence (CTI) team is the continuous assessment of the threat landscape. This requires several steps. Given that our main goal is to improve IT security, we focus on threats from the cyber domain. However, we also pay attention to geopolitical factors that may influence the situation. Adopting this focus, we identify relevant data sources and process their content. From the resulting information, we compile a threat landscape assessment through analysis.
One of the most valuable sources of data are the traces of cyber attackers that the Computer Security Incident Response Team (CSIRT) continuously collects while handling incidents. For this article, we have deliberately focused on the 53 largest of all 158 cases handled by the CSIRT in 2022. These cases were significant because of their extent, effects and the existing traces of the perpetrators. This data was then processed to provide a detailed overview and evaluation of the attacks.
This review is not a complete assessment of the threat landscape. However, from the incidents analysed, generally applicable measures can be derived to increase protection from current cyber attacks.
In order to classify the companies concerned in the cases analysed according to their economic activities, we used a sector list that can be found in the open source tool OpenCTI. This list fulfils our central requirement: its potential as a standard. A widespread use of a uniform list can enable a better overall perception of the threat landscape.
The list contains 22 different sectors, ten of which were involved in the 53 cases. From the 53 cases examined, 3 sectors also emerged that were most frequently affected. Even though the CSIRT was mostly active in the Finance, Manufacturing and Technology sectors, we do not want to generalise and conclude that the other sectors are less affected by cyber incidents. On the contrary, in our daily work it becomes clear time and again that any company can be affected – regardless of the sector and the size of the company.
Figure 1: Economic sectors using OpenCTI’s listing of the 53 largest CSIRT cases in 2022
At the start, we briefly discussed our dataset, including the fact that we focused on the 53 largest cases. Several cases involving IT service providers also had an impact on this selection. Here, it became apparent that a large number of incidents can quickly stem from just one incident. The incidents spread to the customers of the IT service providers, who then also requested support from our CSIRT.
Preventive cyber security – IT service providers
This brings us to some initial preventive measures, as IT service providers have been the victims of cyber attacks with increasing frequency in recent years – and the trend is probably increasing.
In order to better protect yourself as a customer of an IT service provider against damage, we advise a contractual regulation. An important element: in the event of an incident, the IT service provider must inform the customer immediately so that no time is lost and measures can be initiated. In addition the IT service provider should at least apply the same security measures as to the customer. It should be noted that security measures never guarantee absolute security, but should reduce the risk.
The NCSC (National Cyber Security Centre) of Switzerland and the NCSC of the United Kingdom (UK) make further recommendations:
How do cyber attackers gain initial access?
Before cyber attackers can cause damage, they must first gain access to the network, what is referred to as “initial access”. We have divided the different initial access methods of the 53 cases into eight categories.
Figure 2: Initial access of the 53 largest CSIRT cases in 2022
Attackers most frequently used a VPN/RDP access (15 cases), other legitimate credentials under the valid accounts category (11 cases) or exploited vulnerabilities (11 cases) as initial access. These three vectors accounted for 70 % of successful initial accesses.
In order to protect against cyber attacks, there are numerous measures that can increase the barriers for attackers. However, with the aid of a threat assessment, possible priorities can be derived in order to decide on more optimal security investments.
The following measures are recommended by our CSIRT based on this analysis. Had they been implemented, they would have been helped in disrupting the three most common initial access methods:
In 85 % of the 53 cases examined, these measures could have helped to make it more difficult for the attackers to gain initial access to the network or prevented them from doing so.
Figure 3: Actions on Objective of the 53 largest CSIRT cases in 2022
For the largest CSIRT cases last year, it is worth taking a look at the “Actions on Objective” according to the Cyber Kill Chain . We examined what the attackers were aiming for and what damage they caused.
Ransomware attacks continue to pose the greatest threat, not least because of the high business impact. On the one hand, there is a risk of business interruption due to encrypted systems. In addition, we observed that data was often exfiltrated, which can lead to a data protection incident.
In a subsequent blog post, we will go into more detail about ransomware incidents. But there are already two questions that every company should be able to answer: first, how does the internal escalation process work in case of an incident? And secondly, who decides whether a system or the network can be disconnected from the internet in the event of an incident?
The measures mentioned above are no guarantee that incidents can be prevented entirely. However, they increase the hurdle for attackers and give defenders more time to recognise and stop the attackers before Actions on Objective. This can minimise damage. In conclusion, let us once again summarise the recommended measures mentioned above:
IT service provider:
A contractual regulation – especially regarding immediate information in the event of a successful attack – is recommended.
At the very least, the same security standards should be in force at the IT service provider as at the customer.
MFA (multi-factor authentication) is recommended; on exposed services this is a must.
As you can see, our work is incredibly exciting and we want to support our customers and the public in protecting themselves against cyber attacks through our situation assessment.
If you don’t want to miss the next CTI blog post focusing on ransomware, all you have to do is to subscribe to our blog updates!