Attacks

The Unacceptable Time Gap Between a Breach and Its Detection

A recent report from NUIX stated that an attacker only needs 15 hours on average to breach a system and identify critical data. 88% of attacks originate via social engineering which means that traditional security controls such as firewalls, NAC and other network security tools will not block them. Cyber-criminals recognize that security teams prioritize certain areas and redirect attacks accordingly.

Various breaches over the last few years including Marriott, Equifax, Adult Friend Finder and Yahoo underscore that our industry’s concept of security is failing. Time and time again, these large companies with substantial security budgets and resources were defeated by attackers.

What makes these breaches so head scratching and disturbing is their lengthy detection times. On average, it is taking 191 days after to uncover the breach. Think of the damage that can be done during this span.

— Lumu Technologies

So why the massive lag?

Security experts will point out that organizations are all in when it comes to breach prevention, but light when it comes to breach detection. With social engineering, breaches will unquestionably continue to happen…even with the best controls. So why not focus more on what can be done to shorten detection and response times?

According to Anton Cuvakin, a security researcher at Gartner, the bigger issue is the complexity of networks. There is an overload of data that an organization has to comb through to find anomalies. Key system alerts can go unheard which brings me to my next point.

We all know our industry is experiencing alert fatigue. To overcome this challenge, we need to apply algorithms that scrub and display what truly matters. We also need to work with preexisting information that doesn’t complicate the situation.

We at Lumu believe enterprises already have all the necessary information, but they need to be in a position to efficiently connect the dots. When Petabytes of information are assigned to a limited human resource, we absolutely must be precise and definitive in what we show.

If you think a missed alert or delayed detection will not happen on your network, then consider the Citrix breach. An attacker remarkably resided on the network for a full decade before ultimate detection. Think about how many employees came and went during this span.

— Lumu Technologies

Citrix surely updated their technology with new firewalls and controls, yet the attacker remained. Clearly it is not just about technology but more about our overall approach.

What can we do to avoid a 10 year or even 191-day detection gap? The first step is to acknowledge you are probably already compromised. Your pentest report may say otherwise, but you must understand attackers will find a way.

When you accept the enemy is inside, you stop thinking about vulnerabilities and start thinking about IOCs (indicators of compromise). Your mission shifts to detecting breaches with speed and ultimately blocking the cybercriminal’s target: data exfiltration.

With this new mindset, static analysts transform into engaged detectives who proactively uncover anomalous behavior. Security teams start embracing and leveraging the fact that criminals are placing their fingerprints all throughout the network.

DNS queries within your logs are gold when it comes to obtaining and matching fingerprints. They allow you to see all network activity and zoom in on suspicious activity. The challenge is separating out the noise.

By pointing your DNS queries to Lumu, it is easy to see meaningful alerts that enable you to detect breaches with speed. Start your free trial today at https://lumu.io.

NUIX Report Link: https://www.nuix.com/black-report/black-report-2018

Recent Posts

  • Trends

Introducing Lumu Autopilot: Autonomous Cybersecurity Operations

Reading Time: 5 mins Introducing Lumu Autopilot, the latest innovation that delivers on our promise…

1 week ago
  • Attacks

PAN-OS Firewall Vulnerability Advisory: Perimeter Defense Breakdown

Reading Time: 4 mins The Palo Alto Networks PAN-OS firewall vulnerability exemplifies critical flaws in…

2 weeks ago
  • Attacks

ConnectWise ScreenConnect 23.9.8 Advisory Alert: Tool for Vulnerability Check

Reading Time: 2 mins Efficiently confirm and address ConnectWise ScreenConnect vulnerabilities with our guide and…

2 months ago
  • Attacks

LockBit Takedown: Advisory Alert

Reading Time: 7 mins LockBit takedown news and guidance: arrests made, resilience shown, and future…

2 months ago
  • Trends

The Struggle to Afford SOC Analyst Salaries

Reading Time: 3 mins Explore the challenges faced by a wide range of organizations in…

3 months ago
  • Attacks

Infostealers: The Silent Threat Compromising the World One Password at a Time

Reading Time: 7 mins Explore how Infostealers compromise global security, silently stealing data and offering…

3 months ago