Site icon GIXtools

Your attack surface is showing, Unit 42 warns enterprises

The average organization adds or updates some 300 services every month, creating a significant challenge for security teams charged with protecting enterprise cloud-based resources, notes Unit 42. Companies in the telecommunications, insurance, pharma and life sciences industries can add over 1,000 new services every month, while those in financial services, healthcare and manufacturing industries often add over 200 new services monthly, says the security research group, which is part of Palo Alto Networks.

This rapid growth of new services often occurs without central IT security oversight, which inevitably leads to misconfigurations and exposures, and those risks mean a higher chance of a breach, Unit 42 stated in its newly released Attack Surface Threat Report. For the report, Unit 42 researchers measured attack surface threats across 265 organizations worldwide, collecting data on exposures and vulnerabilities over a one-year period.

According to its data, new and updated services are responsible for nearly 32% of organizations’ high or critical cloud exposures. In addition, IT and networking infrastructure, business operations applications, and remote access services account for 73% of high-risk exposures that could be exploited for lateral movement and data exfiltration, researchers stated. 

“The 2024 Unit 42 Incident Response analysis revealed that organizations with partial or incomplete deployment of security controls, particularly endpoint detection and response tools, enabled attackers to operate unhindered in undefended network areas,” researchers stated.

Security risks are often exacerbated by vulnerabilities in internet-accessible administrative login pages of core networking and security appliances, including routers, firewalls and VPNs, Unit 42 stated. Application layer protocols such as SNMP, NetBIOS and PPTP are most often susceptible.

Perhaps not surprisingly, Internet-facing resources are targeted most often by attackers, according to Unit 42. 

“Each vulnerable, internet-facing asset represents a potential entry point for attackers, and the severity of each vulnerability also increases the risk,” researchers stated. “The longer these vulnerabilities remain unaddressed, the higher the chance that they’ll be discovered and exploited by malicious actors. This is particularly critical given that sophisticated attackers are constantly scanning for new opportunities and can often weaponize new vulnerabilities within hours or days of their discovery.”

In addition, attackers speed up their activity both before launching an attack and after successfully infiltrating a target network. “According to prior research, attackers can scan the entire IPv4 address space, all 4.3 billion IPv4 addresses in minutes, looking for opportunities. Additionally, once attackers are in, they move faster to steal data, sometimes getting in and out in less than one day,” Unit 42 stated.

The report notes a number of common exposure points, including:

To improve protection, organizations should identify attack surface risks with continuous, comprehensive scans of their ports, services and devices.

“Once you have a continuously updated inventory of internet-connected assets, the next step is to ensure all exposures and vulnerabilities are identified and routed to the appropriate stakeholders for swift remediation,” Unit 42 stated. “Focus on addressing the most critical vulnerabilities and exposures, such as those with a high Common Vulnerability Scoring System (CVSS), which indicates severity, and Exploit Prediction Scoring System (EPSS), which indicates the likelihood of exploitation, to reduce the risk of successful cyberattacks.”

Other protection suggestions include:

Read the latest network security stories:

Source:: Network World

Exit mobile version