The Coronavirus is hitting hard on the world’s economy, creating a high volume of uncertainty within organizations. New data reveals that the Coronavirus has a significant impact on information security and that the crisis is actively exploited by threat actors. In light of these insights, We share a few ways to best prepare for the Coronavirus derived threat landscape and provides a solution (l to protect employees that are working from home with their personal computers, because of the coronavirus.
Two main trends – attacks that aim to steal remote user credentials, and weaponized email attacks
:
Remote User Credential Theft
The direct impact of the Coronavirus is a wide quarantine policy that compels multiple organizations to allow their workforce to work from home in order to maintain business continuity. This inevitably entails shifting a significant portion of the workload to be carried out remotely, introducing an exploitable opportunity for attackers.
The opportunity attackers see is the mass use of remote login credentials to organizational resources that far exceed the norm. As a result, remote connections are established by employees and devices that have never done so before, meaning that an attacker could easily conceal a malicious login without being detected by the target organization’s security team.
Our global threat telemetry from the recent three weeks reveals that Italy features a sharp spike in phishing attacks in comparison to other territories, indicating that attackers are hunting in full force for user credentials.
In addition, we detect a respective spike both in detected anomalous logins to its customers’ environments, as well as in customers actively reaching out to CyOps
Weaponized Email Attacks
Employees that work from home often would do so from their personal computers which are significantly less secure than the organizational ones, making them more vulnerable to malware attacks.
In addition, we released today’s figures that support the above claim. Here is the double spike we are seeing within its customers from Italy of email-based attacks:
A closer look at the attacks reveals that they possess a considerable threat to organizations that do not have advanced protection in place:
While 21% of these emails featured simplistic attacks with a link to download a malicious executable embedded in the email body, the vast majority included more advanced capabilities such as malicious Macros and exploits or redirection to malicious websites – a challenge that surpasses the capabilities of most AV and email protection solutions.
Taking a closer look at how these attacks were blocked verifies that they should be regarded as a serious risk potential:
Moreover, there is another aspect to the Coronavirus impact. In many cases, the functioning of the security team itself is impaired due to missing team members in quarantine, making the detection of malicious activity even harder. From conversations with these companies, it turns out that the operations of many security teams are significantly disturbed due to quarantined team members, causing them to use Medshiftt’s IMDR service more often to compensate for the lack of staff.
In order to efficiently confront these threats, CISOs should evaluate the defenses they have in place and see whether they provide protection against phishing and malicious logins.
As a breach protection platform, Medshifts introduces a dedicated offering tailored to the new Coronavirus related cyber risks.
For new clients we are cutting our cost in half for our IMDR 24/7 service, on personal computers used by employees working from home.
A massive addon is will be a Vulnerability testing of your entire global network
Designated Cyber Team located and maintain data right in the US & Canada
Contact us to learn more about this service.info@medshiftcyber.com