
All I want for Phishmas is…next-generation inline phishing protection (ICES)
Selina CoenDiscover the risks of holiday phishing and fortify your defenses with TitanHQ's ICES solution, PhishTitan—read now to secure a safe and joyous festive season.
You cannot have a deliberation about cybersecurity without discussing email security. Due to its ubiquitous nature within the enterprise, email security is part of the foundation that protects the assets within an enterprise. Roughly 90 percent of targeted cyberattacks start with email. Despite all of the attention that has been directed at cyber hygiene, users continue to click on links with little regard to the consequences of their actions. Even more concerning, is the number of user accounts that are hacked and compromised each year. Email accounts are tied in some way to everything online, hence they are a valuable target for hackers. An email address usually equates to one’s username and it is the main method to reset passwords. Once an intruder has taken control of your email account, a lot of bad things can happen as a result.
Compromised email accounts have become too much of a regularity today and the numbers are staggering. It is estimated that 2.5 billion accounts were hacked in 2019 alone. That computes to 6.85 million accounts being compromised every day – 158 every second. And yet, even with those mind blowing numbers, it is easy to disregard these as frivolous personal accounts that have been compromised. Unfortunately, that is far from the case. Hackers are in pursuit of high value accounts that are linked to high value assets. The seizure of an email account is the first step into compromising an organization at large. There is no better recent example of this than the recent compromise of dozens of email accounts at the U.S. Treasury Department last December. One must wonder, what chance they have of securing email accounts if the United States government can’t even do it.
The seizure of privileged user accounts was not the result of your average credential stuffing attack, but the result of a highly sophisticated software chain attack. According to a statement released by Senate Finance Committee ranking member, Ron Wyden:
“Hackers broke into systems in the Departmental Offices division of Treasury, home to the department’s highest-ranking officials.”
The breach was a part of the highly publicized SolarWinds Attack in which foreign hackers, most likely sponsored by the Russian government in some way, exploited a weakness in the SolarWinds Orion monitoring and management software. This allowed the hackers to simply sign in without having to guess usernames and passwords. As a result, the attackers were able to impersonate users and operate freely within the compromised organizations. Unfortunately, no one knows for sure what information was stolen or the full slate of actions carried out by the involved hackers. Microsoft has confirmed that they have fixed the flaw exploited by the attack. Unfortunately, the attackers had the ability to infiltrate as many as 18,000 government and private networks, potentially seizing user ID’s, passwords, financial records, source code and other sensitive or high value data.
Email accounts are one of the weak links that cybercriminals frequently target. In the same way that hackers leveraged the SolarWinds exploit to potentially infiltrate thousands of networks, the leveraging power of a single compromised email can result in compounding consequences. That’s because a single email address is linked to other user accounts, giving attackers access to other informational treasure troves. It is the same concept in which a pandemic can quickly spread through physical contact with a single infected host.
While politicians, regulators, cybersecurity professionals and software developers try to figure out what could have been done to prevent this attack, it is clear that there is no easy answer. Supply chain attacks are tough to defend against since you are relying on the software vendor to secure their source code and platforms. In this case, the usual recommendations would not have done anything to prevent this attack.
The ease at which highly privileged user accounts within the United States government were compromised, should be a wakeup call to all enterprises. In our highly connected and digital world of today, a zero-trust security model must be implemented. This means questioning the security of any software or hardware utilized within an enterprise. Skepticism, cynicism, and disbelief are traits that can protect an organization.
Protect your organization with SpamTitan Email Protection. Protect against Zero-day attacks with a multi-award winning, advanced security solution. Start SpamTitan free trial today.
Discover the risks of holiday phishing and fortify your defenses with TitanHQ's ICES solution, PhishTitan—read now to secure a safe and joyous festive season.
Explore the chilling tale that won our Cy-BOO! Security Awareness Month Competition, revealing the eerie truths of cybersecurity in a hair-raising narrative.
On how many times have you received a phone call or an email from a manager in your group requesting he password of an employee to allow them to log...
Sign-up for email updates...
Call us on USA +1 813 304 2544 or IRL +353 91 545555
Contact Us