• Latest
  • Trending
Why Timely Response is Essential and How to Achieve It

Why Timely Response is Essential and How to Achieve It

July 6, 2022
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023
Data Leak Hits Thousands of NHS Workers

Data Leak Hits Thousands of NHS Workers

February 20, 2023
EU Cybersecurity Agency Warns Against Chinese APTs

EU Cybersecurity Agency Warns Against Chinese APTs

February 20, 2023
How Your Storage System Will Still Be Viable in 5 Years’ Time?

How Your Storage System Will Still Be Viable in 5 Years’ Time?

February 20, 2023
The Broken Promises From Cybersecurity Vendors

Cloud Infrastructure Used By WIP26 For Espionage Attacks on Telcos

February 20, 2023
Instagram and Facebook to get paid-for verification

Instagram and Facebook to get paid-for verification

February 20, 2023
YouTube CEO Susan Wojcicki steps down after nine years

YouTube CEO Susan Wojcicki steps down after nine years

February 20, 2023
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
Fibre optic interconnection linking Cameroon and Congo now operational

Fibre optic interconnection linking Cameroon and Congo now operational

July 15, 2022
Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

July 15, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Wednesday, 29 March, 2023
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

Why Timely Response is Essential and How to Achieve It

by ITECHNEWS
July 6, 2022
in Leading Stories, Opinion
0 0
0
Why Timely Response is Essential and How to Achieve It

YOU MAY ALSO LIKE

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Data Leak Hits Thousands of NHS Workers

Advanced persistent threats continue to test organizations’ strength by exploiting new vulnerabilities, organizing massive supply chain incidents and targeting specific industries. According to a study, 84% of enterprises globally acknowledge that cyberattacks have become more sophisticated, causing worries about vulnerabilities, attack surfaces, threat tactics, malware, mobile device security and the use of consumer cloud services by employees.

Fortunately, there are plenty of tools, sources of information and guidelines that help fine-tune responses to sophisticated attacks allowing for a clear understanding of how to hunt threats and remediate IT systems. Since the average cyberattack lasts a day and a half, security teams need to react quickly. However, a timely response doesn’tnecessarily mean malicious actions should be immediately blocked. It is important to understand the right moment to start the containment, eradication and recovery phases of response as an untimely reaction can signal to attackers that their actions are no longer going unnoticed.

For example, if the incident response team blocks infected software, malicious IP addresses or URLs as soon as the first signs of a threat are detected, then the attackers can simply hide in the network or change their tactics. This could potentially require the investigation cycle to start all over again. Moreover, attackers can sometimes hide so well and for so long that discovery would be almost impossible until their next malicious activity is revealed.

Advanced persistent threats (APTs) use lateral movement techniques to stay unnoticed for days, months or even years while they seek out crucial assets in the victim’s environment. For example, in one Lazarus attack, the actor managed to overcome network segmentation and reach the restricted network thanks to lateral compromise of the administration machine that connected both the corporate and restricted segments. Analysis of TunnelSnake’s APT operation revealed a case in South Asia where the threat actor had a foothold within the network from as early as 2018.

Another issue with early reaction is that it can create a situation in which some attack artifacts are left unnoticed during the eradication stage because the IT security team didn’t detect them or didn’t relate them to the attack during the investigation stage.

Furthermore, the entry point might remain unclear. This could include a vulnerability, an unprotected endpoint or any other vector. In this case, even if the attack were stopped and all malicious elements were wiped out, the risk ofintruders making another attempt through the same gates but with new tactics, techniques and procedures would remain.

With APTs growing in volume and sophistication, there are, however, response steps that can be taken to avoid damaging outcomes.

Find the Attack Kill Chain

As soon as an IT security team discovers that their organization is compromised and there is a human on the other side(not just malware), they need to follow the attack and find as many traces as possible. The attacker’s actions should be followed across the whole network, not just the immediate perimeter. The further the attack goes, the more traces it leaves; threat hunters can attribute these to an APT group—or at least guess its target—and then hunt it down in the most effective way. It is extremely important to find the attack entry point to avoid repetition of this type of incident.

The end goal of incident response is accomplished through two activities: Investigation and remediation. The investigation stage involves determining the attack vector, tools, affected systems, damage, intrusion time frames and so on. In other words, comprehensive analysis is a must before moving to remediation.

Threat intelligence and attack evaluation approaches, such as MITRE ATT&CK, are key at this stage.

Response Means Knowing When to Stop the Attack

It goes without saying that it is important to stop the intruder before they reach critical business services or move to another organization the company connects with. This is where the team’s skills come in; by collecting the maximum amount of data about the attack, they can enable planning the most effective response while still acting before the intruder can have a significant impact on the business.

Learn and Monitor the Network

IT security teams should have a clear picture of the whole enterprise network including edge devices, endpoints, network segments and connected equipment. This is achievable through network monitoring, regular audits, scanningof connections and so on. For large enterprises with many entities, supply chains and subsidiaries⁠—this is a must.

Implementing network audits and monitoring, along with measures such as policies and network segmentation, helpsdecrease the number of potential entry points.

Familiarity with the network is also crucial to understanding response⁠—when to contain and eradicate an attack before it reaches critical business processes. At the eradication and remediation stages, all malware tools and traces should be removed from all endpoints, all compromised systems re-installed and credentials reset. Overlooking any piece of malware in the backend of the network can allow another round of attacks in the future.

The silver lining of these critical attacks is that the more time we spend investigating and observing them, the more we learn about the actors behind them and the more we can help organizations anticipate their methods. Threat intelligence and specific tools are designed to help enterprises detect malicious actions sooner, but expertise remains the crucial factor in detection, investigation, cleanup and avoidance of recurrence.

To this end, organizations are still faced with a choice: Either to build an internal team of talent capable of leveraging useful threat intelligence and employing effective investigative and response functions or partner with a trusted, experienced third-party expert who can do this for them. Of course, a combination of the two is a logical choice for many; however, the absence of either will only become more consequential as sophisticated threats continue to evolve.

Source: Rob Cataldo
Via: Security Boulevard
Tags: Why Timely Response is Essential and How to Achieve It
ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023
Data Leak Hits Thousands of NHS Workers

Data Leak Hits Thousands of NHS Workers

February 20, 2023
EU Cybersecurity Agency Warns Against Chinese APTs

EU Cybersecurity Agency Warns Against Chinese APTs

February 20, 2023

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023
Data Leak Hits Thousands of NHS Workers

Data Leak Hits Thousands of NHS Workers

February 20, 2023

Recent News

  • Co-Creation Hub’s edtech accelerator puts $15M towards African startups February 20, 2023
  • Data Leak Hits Thousands of NHS Workers February 20, 2023
  • EU Cybersecurity Agency Warns Against Chinese APTs February 20, 2023
  • How Your Storage System Will Still Be Viable in 5 Years’ Time? February 20, 2023
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version