Be prepared for the increase in reconnaissance

Issue 4 2022 Information Security

Cybercriminals are always looking for opportunities to wage an attack. Whether it's a vulnerable system or a particularly enticing email designed to dupe an unsuspecting employee into clicking, low-hanging fruit is everywhere.


Aamir Lakhani.

Many organisations bank on the notion that if they put some defences in place, an attacker will move on to an easier target. But that approach doesn't take greed into account. Because ransomware has become so lucrative, cybercriminals are becoming more devious and putting significantly more energy into reconnaissance.

Pay attention to the left-hand side

Reconnaissance is one of the first phases of an attack. The steps are often described as a progression, starting on the left and moving to the right. The MITRE ATT&CK; framework and Lockheed Martin Kill Chain are two examples that detail the tactics used in a campaign. The left-hand side includes pre-attack strategies, such as reconnaissance, planning and development. On the right-hand side are the execution phases that include launching malware and stealing data.

The left side includes advanced persistent threats (APTs) with activities that include determining that a network is vulnerable, obtaining unauthorised access, and avoiding detection for an extended period of time. State-sponsored actors or nation states with considerable resources are often allied with APTs.

Most organisations don't focus as much on the left side of the attack framework, but that mindset needs to change. With better reconnaissance, cyberattacks are likely to be more effective and more destructive. Ransomware attacks will increase and undoubtedly become more expensive. According to FortiGuard Labs researchers, in the 12 months between July 2020 and June 2021, there was an almost eleven-fold increase in ransomware.

Ransomware attacks may even be accompanied by distributed denial of service (DDoS) attacks designed to distract and overwhelm security teams. And the addition of wiper malware that destroys data, systems and hardware acts as an added incentive for companies to pay quickly.

A recent global ransomware survey conducted by Fortinet indicates that ransomware is routinely successful, with 67% of organisations reporting having been a ransomware target. And nearly half said they'd been targeted more than once.

More money means more cybercrime

As the number of incidents increases and gangs compete for a slice of the profitable pie, cybercriminals motivated by money are going to focus more attention on left-side activities. Much like nation-state-funded APT groups, these groups are likely to spend more time and effort on reconnaissance and ferreting out zero-day capabilities.

By spending more time on the left-hand side doing reconnaissance, cybercriminals can improve the likelihood of a successful attack. Often, they can even reuse the same reconnaissance techniques against other organisations. So, some upfront effort can reap great rewards.

Attack kits will make it easier for other attackers to reuse tactics and exploit vulnerabilities. These kits, coupled with the increase in malware-as-a-service, mean the sheer number of attacks is likely to rise because there will be more cybercriminals and their affiliates launching attacks at the same time.

Get smarter about reconnaissance

To combat advanced attacks, organisations need holistic and scalable security that facilitates visibility and communication across the network. To mount a swift and coordinated response, security solutions should be enhanced with artificial intelligence (AI) so they can detect attack patterns and stop threats in real time. Solutions should also be able to scale to address the increase in attacks. Organisations should have these solutions in place:

• Anti-malware that includes AI detection signatures.

• Endpoint detection and response (EDR).

• Advanced intrusion prevention system (IPS) detection.

• Sandbox solutions augmented with MITRE ATT&CK; mappings.

• Next-generation firewalls (NGFWs).

• Digital risk protection service (DRPS) designed to counter attacks at the reconnaissance phase.

Ideally, the tools should be deployed consistently across the distributed network, including data centre, campus, branch, multi-cloud, home office and endpoint, using an integrated security platform such as the Fortinet Security Fabric.

The Security Fabric can detect, share, correlate and respond to threats as a unified solution. It integrates crucial security and networking solutions, including third-party components, and supports and supplements the people and processes that are part of in-house teams and skillsets.

Fortinet delivers a multi-phase approach to cybersecurity that can prevent the early-stage delivery of threat components as much as possible, while continuing to inspect for and detect activity that indicates an intrusion or attack in progress. It is followed by a quick response to cyber events, coordinated across the distributed cybersecurity mesh, to contain and mitigate attacks. 

Cybercriminals will be upping their games with more reconnaissance efforts, more zero-day exploits and more attacks, so organisations need to take action before it's too late.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Africa’s largest Zero Trust platform
NEC XON Information Security Commercial (Industry)
Africa has reached a significant cybersecurity milestone with the successful deployment of the continent’s largest Palo Alto Networks Prisma Access and Prisma Access Browser Zero Trust environment, supporting secure remote access for more than 40 000 users for a large enterprise in Africa.

Read more...
Supply chain attacks top threat over 12 months
Information Security
Supply chain attacks have become the most prevalent cyberthreat confronting businesses over the past year, according to a new Kaspersky global study, with nearly one-third of companies worldwide experiencing a supply chain threat in the past year.

Read more...
From vibe hacking to flat-pack malware
Information Security AI & Data Analytics
HP issued its latest Threat Insights Report, with strong indications that attackers are using AI to scale and accelerate campaigns, and that many are prioritising cost, effort, and efficiency over quality.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Microsoft 365 security is a ticking time bomb
Information Security
Across boardrooms and IT departments, a dangerous assumption persists that because data is stored in Microsoft 365 and Azure, it is automatically secure. This belief is fundamentally flawed and fosters a false sense of protection.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.