Palo Alto Networks Blog 2024年10月03日
The Top 5 Largest Scale Intrusions in 2023
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

2023年大规模网络入侵增多,攻击者利用新技术和策略,瞄准软件漏洞。文章分析了多个知名攻击事件及原因,并提出防御建议。

2023年出现多起利用软件漏洞的大规模网络入侵事件,如MOVEit、Citrix Bleed、SugarCRM、Apache Log4j、Oracle WebLogic等,影响广泛

攻击者利用新技术,如自动化扫描器、机器学习模型等,寻找并利用漏洞,还采用自动化手段实施攻击和数据窃取

社会工程学虽仍存在,但自动化使攻击者更易找到无需内部人员配合的漏洞,同时网络黑市减少了直接钓鱼获取凭证的需求

防御关键在于实施多层防御,包括多层安全措施、及时中断攻击早期阶段、优先处理最敏感漏洞的补丁管理等

What Powered Them?

Large-scale cyber intrusions increased during 2023, exploiting vulnerabilities in web applications and internet-facing software. Attackers favored this attack vector even more than phishing and other social engineering tactics. But why?

Attackers are using new technologies and tactics that take advantage of shortcomings in patch and vulnerability management processes. These tools allow them to find, initiate and execute intrusions at greater speed.

The Unit 42 Incident Response Report analyzed thousands of incidents to learn what tools and vulnerabilities attackers are focusing on. Read on to unpack the concerning trends of large-scale intrusions and empower your organization to fight back.

Notable Intrusion Campaigns

MOVEit: CVE-2023-34362

In one of the most infamous attacks of 2023, a critical zero-day vulnerability (CVE-2023-34362) was found in a widely used file transfer service for secure data exchange. This system is popular across highly regulated industries and government agencies, such as critical infrastructure providers, healthcare institutions and even government bodies. The impact was far-reaching, affecting over 2,600 organizations, and spread even to organizations whose vendors used the file transfer service.

A large number of systems containing this vulnerability were exposed to the internet. Researchers identified more than 3,000 before the vulnerability was disclosed and patched. The vulnerability was rated a critical 9.8 out of 10 on the Common Vulnerability Scoring System (CVSS) because it was easy to exploit and the data involved was often sensitive. Analysts attributed this attack to the CL0P ransom group, which indicates these file sharing services are targets for large cybergangs.

But, file services aren’t the only ones affected by software vulnerabilities.

Citrix Bleed: CVE-2023-4966

Another major attack vector in 2023 exploited a critical vulnerability in widely deployed remote access and virtual desktop appliances. This flaw allowed attackers, such as the ransomware group LockBit, to gain a foothold from which they could execute malicious tactics.

Our Incident Response (IR) and Managed Threat Hunting (MTH) teams observed ransomware groups exploiting Citrix Bleed. The MTH team has also observed remote executions from Netscaler gateways in association with the exploitation of this vulnerability.

Using this vulnerability, attackers bypassed security controls to hijack legitimate user sessions, gain unauthorized access to systems and steal credentials and other sensitive information. And with the widespread use of the remote access system across various industries (aerospace, banking, shipping logistics, etc.), the potential victim pool is vast.

Even with patches available from the manufacturer, this remote access tool is so widely used that many organizations are still suffering the results of the vulnerability.

SugarCRM: CVE-2023-22952

A third zero-day vulnerability exploited in 2023 was exposed in a popular customer relationship management (CRM) system. This vulnerability allowed attackers to bypass authentication altogether and execute malicious code directly on vulnerable servers. Not only that, the exploited code itself was publicly posted online, complete with instructions for finding similar vulnerable servers.

The potential impact of an exploited CRM isn’t limited to the servers. CRM systems often house sensitive data, such as customer information, financial records and internal communications. In the wrong hands, it’s easy to see how attackers could use this data for extortion attempts, sell on the dark web, or simply use it to damage an organization’s reputation.

Palo Alto’s investigations into this exploit reveal a troubling trend. In many cases, attackers used the initial breach to gain access to cloud service accounts with far-reaching permissions. This demonstrates how one weak link in the security chain puts the entire environment at risk, leaving it open to cascading attacks.

Apache Log4j: CVE-2021-44228

One of the most widespread vulnerabilities in recent years was discovered in the Apache Log4j logging library, a common logging framework developed by a well-known open-source organization. This library plays a vital role over a wide range of industries. It records important information, like error messages and user actions, within various software programs and creates an audit trail of the program’s activity.

A critical vulnerability, first discovered in 2021, gave attackers a way to leverage this library for their gain by essentially granting attackers complete control of any system running an unpatched version of the logging library. Hackers need only inject malicious code into seemingly harmless places, like chat boxes and login forms to gain access using this vulnerability, with no special permissions or authentication required.

Logging libraries often interact with various services within a system, making it easy to distribute malware rapidly and potentially compromise entire networks in a short time frame.

So why is a 2021 vulnerability on the 2023 top-five list? Because the library was embedded in so much software, the number of affected systems is so large that the U.S. Department of Homeland Security estimates it will take at least a decade to find and fix every vulnerable instance.

Oracle WebLogic: CVE-2020-14882

A Java-based enterprise application, used by more than 7,000 organizations globally, suffered similar attack campaigns in 2023. This time, the platform vulnerability resided in the administrative console – a fast track to significant impact, with the flaw allowing remote attackers access to the inner workings of the platform itself.

Due to the high level of privilege, attackers could seize complete control of applications running on the platform with ease. With one click, a hacker could gain unrestricted access to financial data, customer records and internal systems. This presented a scenario ripe for disruptions, data breaches and financial losses.

The situation was complicated because there were multiple vulnerable versions of the platform and the sheer number of deployments around the globe was daunting. While the company released patches as early as October 2020, the platform’s widespread adoption meant many organizations were still working with unpatched systems by 2023. Moreover, the vulnerability was relatively easy to exploit, requiring minimal technical expertise on the part of the attacker.

How Did This Happen?

Widespread impact is the goal of these exploitations. Attackers are looking for the fastest, most convenient method to access sensitive systems.

In previous years, social engineering tactics, like phishing, were the most common initial access vector. New technologies are shifting the landscape and changing the way threat actors approach their attacks.

Social engineering casts a wide net and relies on human error to exploit. In 2023, automation boosted attackers’ abilities to find vulnerabilities that don’t require them to compromise an insider. Online black markets for stolen credentials lessened the need for attackers to directly phish credentials from staff members.

Recommendations for Defenders — Discovery and Analysis

The key to preventing these intrusions lies in implementing a multi-layered defense, creating multiple hurdles for attackers to overcome before they can reach your sensitive data. The 2024 Unit 42 Attack Surface Threat Report found almost a third of newly-discovered high and critical priority exposures stemmed from changes in attack surface… on average, more than 300 new services each month. Managing that much change is challenging.

Multi-Layered Security

Imagine each layer of security – endpoint controls, automation, network segmentation and multi-factor authentication – as a potential tripwire. The more layers you have in place, the more sensors to indicate malicious activity, the greater the chance of disrupting an attack and regaining control sooner than later.

Interrupting attacks in their early stages is one of the ways Unit 42 has been successful in preventing them from escalating into full-blown ransomware situations. For example, data encryption typically occurs later in the attack lifecycle. The sooner and faster you can investigate suspicious activity, the better chance you have of mitigating potential damage.

Patch Management

Patching every vulnerability is a tall order for even the most seasoned and well-resourced security teams. Teams can reduce more risk with less effort by prioritizing the most sensitive vulnerabilities. The Cortex Xpanse platform uses machine learning models to continuously map your attack surface and prioritize remediation efforts. This helps reduce the median time to detect and the median time to respond without additional analysts.

Consistent Coverage

Partial security coverage creates weak spots. Organizations with partial deployments of security controls, particularly endpoint detection and response, left portions of their network exposed. Attackers infiltrate these unguarded areas and establish a foothold, making it more difficult to oust them.

Improve your external and internal coverage with advanced scanning tools and services:

Use Analysis to Stay Ahead of the Curve

Knowing about vulnerabilities is just half the battle. Organizations must prioritize these threats based on the potential risk they pose, or risk overlooking critical threats in a haphazard approach.

Cortex Prisma Cloud provides risk-based vulnerability management, empowering you to focus resources on the most valuable issues. Combined with a robust XDR tool, discovery and analysis can equip security teams with the tools they need to combat increasingly sophisticated attackers.

Ready to Take the Next Step?

If you’re interested in learning how Prisma Cloud and Cortex XDR can set your team up for success, stay ahead of attackers, and proactively manage vulnerabilities, get in touch. Together, we can build a stronger defense against threats from the inside out.

The post The Top 5 Largest Scale Intrusions in 2023 appeared first on Palo Alto Networks Blog.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

网络入侵 软件漏洞 自动化攻击 防御建议
相关文章