<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>White Papers Archive | Fortress SRM</title>
	<atom:link href="https://fortresssrm.com/white-papers/feed/" rel="self" type="application/rss+xml" />
	<link>https://fortresssrm.com/white-papers/</link>
	<description>Full-Spectrum Cybersecurity Protection</description>
	<lastBuildDate>Thu, 15 Feb 2024 20:39:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://fortresssrm.com/wp-content/uploads/2021/05/cropped-FORT_Favicon-32x32.png</url>
	<title>White Papers Archive | Fortress SRM</title>
	<link>https://fortresssrm.com/white-papers/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Fortifying Your Brand &#8211; The Essential Guide to Enterprise Social Media Security</title>
		<link>https://fortresssrm.com/white_papers/fortifying-your-brand/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Thu, 15 Feb 2024 20:37:19 +0000</pubDate>
				<category><![CDATA[Incident Prevention]]></category>
		<category><![CDATA[Threat & Security Updates]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?post_type=white_papers&#038;p=1337</guid>

					<description><![CDATA[<p>By: Will Hudec, Director of Security Consulting, Fortress Security Risk Management In the digital age, the security of corporate social media accounts is not just an IT concern, but a ...</p>
<p>The post <a href="https://fortresssrm.com/white_papers/fortifying-your-brand/">Fortifying Your Brand &#8211; The Essential Guide to Enterprise Social Media Security</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<p><strong>By: Will Hudec, Director of Security Consulting, Fortress Security Risk Management</strong></p>
</div>
</div>



<p>In the digital age, the security of corporate social media accounts is not just an IT concern, but a strategic imperative that directly impacts brand reputation, customer trust, and potentially, a company&#8217;s bottom line.</p>



<p>Social media platforms, while essential for marketing and customer engagement, are also attractive targets for cybercriminals. A breach can lead to unauthorized posts, resulting in reputational damage, loss of sensitive data, and even financial consequences, as seen in high-profile cases like the SEC X account hack earlier this year.</p>



<p>To mitigate these risks, companies should adopt a comprehensive approach to social media security. This includes the use of strong, unique passwords, enabling two-factor authentication, and limiting account access to a select group of trusted employees. Regular monitoring of account activity can help detect any unusual behavior indicative of a breach.</p>



<p>Furthermore, companies should establish a well-defined social media policy, conduct regular security training for employees, and have an incident response plan in place. The use of dedicated emails for social media accounts and secure connections for account access can provide additional layers of security.</p>



<p>Finally, the use of social media management tools that offer robust security features, such as Hootsuite or Sprout Social, can help streamline the process of securing multiple accounts across different platforms.</p>



<p>In conclusion, securing corporate social media accounts should be a top priority for businesses in today&#8217;s interconnected world. By implementing these best practices, companies can protect their digital presence, maintain customer trust, and safeguard their reputation.</p>



<p><strong>Threat Landscape Update</strong></p>



<p>As society becomes more interconnected, a growing concern has emerged regarding the deliberate targeting of social media accounts by threat actors. These malicious entities, ranging from cybercriminals to state-sponsored hackers, recognize the strategic value of infiltrating and manipulating organizations&#8217; online presence. The compromise of social media accounts not only poses a direct threat to data security but also jeopardizes brand reputation, customer trust, and overall organizational stability. Below, you will find recent instances where this occurred:</p>



<ul class="wp-block-list">
<li>Mandiant X Account (<a href="https://www.bleepingcomputer.com/news/security/mandiants-account-on-x-hacked-to-push-cryptocurrency-scam/">Mandiant’s account on X hacked to push cryptocurrency scam (bleepingcomputer.com)</a>)<ul><li>The Twitter account of American cybersecurity firm and Google subsidiary Mandiant was hijacked on January 3rd to impersonate the Phantom crypto wallet and share a cryptocurrency scam.</li></ul><ul><li>After getting control, the attacker renamed it to @phantomsolw and promoted a fake website impersonating the Phantom crypto wallet and promising to distribute free $PHNTM tokens as part of an airdrop.</li></ul>
<ul class="wp-block-list">
<li>The attacker then attempted to drain the targets’ cryptocurrency wallets by having them install a malicious app through the phishing link in the post.</li>
</ul>
</li>



<li>SEC X Account (<a href="https://www.bleepingcomputer.com/news/security/us-secs-x-account-hacked-to-announce-fake-bitcoin-etf-approval/">US SEC’s X account hacked to announce fake Bitcoin ETF approval (bleepingcomputer.com)</a>)<ul><li>The X account for the U.S. Securities and Exchange Commission was hacked on January 9th to issue a fake announcement on the approval of Bitcoin ETFs on security exchanges.</li></ul><ul><li>&#8220;Today the SEC grants approval to Bitcoin ETFs for listing on registered national security exchanges,&#8221; read the fake X post.</li></ul><ul><li>The news quickly spread, with many cryptocurrency and mainstream news sites covering the story and Bitcoin prices briefly spiking.</li></ul>
<ul class="wp-block-list">
<li>The U.S. Securities and Exchange Commission confirmed today that its X account was hacked through a SIM-swapping attack on the cell phone number associated with the account.</li>
</ul>
</li>



<li>The Associated Press Twitter Hack (2013) (<a href="https://www.bloomberg.com/news/articles/2013-04-23/dow-jones-drops-recovers-after-false-report-on-ap-twitter-page">AP Twitter Account Hacked in Market-Moving Attack &#8211; Bloomberg</a>)<ul><li>In April 2013, the Twitter account of The Associated Press (AP) was hacked after a phishing attack.</li></ul><ul><li>The attackers posted a false tweet claiming that there had been two explosions at the White House and that the President was injured.</li></ul><ul><li>This tweet caused a temporary stock market dip, wiping out $136 billion in equity market value.</li></ul>
<ul class="wp-block-list">
<li>The AP quickly regained control and clarified the situation, but the incident highlighted the potential for significant real-world consequences from social media account breaches.</li>
</ul>
</li>
</ul>



<p><strong>Social Media Account Security Best Practices</strong></p>



<p>Securing corporate social media accounts is crucial to protect the company&#8217;s reputation, customer trust, and sensitive information. Here are some best practices for securing these accounts against attacks or compromise:</p>



<ul class="wp-block-list">
<li>Strong Passwords: Use complex passwords that include a mix of letters, numbers, and special characters. Avoid using easily guessable information like company name or &#8220;password.&#8221;</li>



<li>Two-Factor Authentication (2FA): Enable 2FA for an additional layer of security. This requires a second form of verification, such as a text message or an authentication app, to access the account.</li>



<li>Dedicated Email: Use a dedicated email address for social media accounts that is not used for other purposes and is not publicly known.</li>



<li>Limited Access: Only grant access to the social media accounts to a select group of trusted employees. Use roles and permissions features to limit what each user can do within the account.</li>



<li>Regular Monitoring: Regularly monitor the accounts for unusual activity. This includes checking for unauthorized posts, messages, or changes to the account details.</li>



<li>Security Training: Train all employees with access to social media accounts on security best practices and how to recognize phishing attempts and other social engineering attacks.</li>
</ul>



<ul class="wp-block-list">
<li>Social Media Policy: Establish a corporate social media policy that outlines acceptable use, who can post, and the process for responding to security incidents.</li>



<li>Update and Patch: Ensure that any software used for social media management is kept up to date with the latest security patches and updates.</li>



<li>*Revoke Access: When an employee with access to the social media accounts leaves the company, immediately revoke their access.</li>



<li>Use of Secure Connections: Always access social media accounts from secure connections. Avoid public Wi-Fi and consider using VPNs.</li>



<li>Incident Response Plan: Have an incident response plan in place that includes steps to take if a social media account is compromised.</li>



<li>Regular Password Changes: Change passwords regularly, and especially after any suspicion of unusual activity.</li>



<li>Verification: Verify the account with the social media platform, if possible, as this can add credibility and sometimes provides additional security features.</li>



<li>Backup Contacts: Keep a backup list of contacts and account recovery information in a secure location.</li>



<li>Audit Trails: Use social media management tools that provide audit trails to track who posts what content.</li>
</ul>



<p>By implementing these best practices, companies can significantly reduce the risk of their social media accounts being compromised.</p>



<p><strong>Appendix</strong></p>



<p>Social Media Management Tools</p>



<p>Social media management tools can help provide security controls and audit capabilities to further help protect corporate social media accounts. Below you will find some examples and features that are focused on keeping these accounts secure. (Note – Fortress does not advocate or formally endorse these platforms)</p>



<p>When choosing a social media management tool, consider the specific needs of your organization, including the number of accounts you need to manage, the size of your team, and your specific security requirements. It&#8217;s also a good practice to take advantage of free trials to test out the features and ensure they meet your expectations before committing to a subscription.</p>



<ul class="wp-block-list">
<li>Hootsuite: Offers comprehensive monitoring across multiple social media platforms and includes features like secure logins, permission levels, and the ability to approve posts before they go live.</li>



<li>Sprout Social: Provides strong security measures, including custom user roles and permissions, audit trails, and secure profile management.</li>



<li>Buffer: Known for its ease of use, Buffer also offers features like two-factor authentication and the ability to easily add or remove team members.</li>



<li>Agorapulse: Includes a unified social inbox for monitoring messages and comments, as well as features for team collaboration and access control.</li>



<li>Sendible: Offers custom workflows for team members, which can help with securing the approval process for content, and also includes two-factor authentication.</li>



<li>CoSchedule: Alongside its scheduling and marketing calendar functionalities, CoSchedule provides team management features to control access and permissions.</li>



<li>Oktopost: Designed for B2B companies, Oktopost focuses on lead generation and includes features for securely managing and monitoring social media activity</li>



<li>Crowdfire: A simpler tool that&#8217;s good for smaller businesses, Crowdfire still includes security features like access controls and secure posting.</li>



<li>Zoho Social: Part of the Zoho suite of business tools, Zoho Social includes role-based access, two-factor authentication, and activity logs.</li>



<li>1SocialPilot: Offers features like social media calendar, bulk scheduling, and team collaboration, with security measures such as access control and secure login.</li>
</ul>



<p><strong>About Fortress Security Risk Management:</strong> <br>Fortress Security Risk Management protects companies from the financial, operational, and emotional trauma of cybercrime by enhancing the performance of their people, processes, and technology.  </p>



<p>Offering a robust, co-managed solution to enhance an internal IT team’s capability and capacity, Fortress Security Risk Management features a full suite of managed security services (24/7/365 U.S. based monitoring, cyber hygiene (managed patching),&nbsp; endpoint detection and response (EDR), and air-gapped and immutable cloud backups) plus specialized services like Cybersecurity-as-a-Service, Incident Response including disaster recovery &amp; remediation, M&amp;A cyber due diligence, GRC advisory, identity &amp; access management, threat intelligence, vulnerability assessments, and technical testing.&nbsp;With headquarters in Cleveland, Fortress supports companies with both domestic and international operations.&nbsp;</p>



<p>In Case of Emergency:&nbsp;<br><strong>Cyber Attack Hotline: 888-207-0123 | Report an Attack: IR911.com&nbsp;&nbsp;</strong></p>



<p>For Preventative and Emergency Resources, please visit: <br><a href="https://ransomwareclock.org/" target="_blank" rel="noreferrer noopener"><strong>RansomwareClock.org</strong></a></p>
<p>The post <a href="https://fortresssrm.com/white_papers/fortifying-your-brand/">Fortifying Your Brand &#8211; The Essential Guide to Enterprise Social Media Security</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bolstering U.S. Critical Infrastructure Protection (CIP) Against Cyber-attacks: The Importance of the TSA Aviation Industry Announcement</title>
		<link>https://fortresssrm.com/white_papers/bolstering-us-critical-infrastructure-protection-tsa-aviation/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Mon, 22 May 2023 17:13:50 +0000</pubDate>
				<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?post_type=white_papers&#038;p=1200</guid>

					<description><![CDATA[<p>By: Chuck Mackey, Director of Cybersecurity Consulting, Fortress Security Risk Management It’s a sad and dangerous fact: cyber-attacks on airports and airlines are increasing in frequency, sophistication, and severity. Here ...</p>
<p>The post <a href="https://fortresssrm.com/white_papers/bolstering-us-critical-infrastructure-protection-tsa-aviation/">Bolstering U.S. Critical Infrastructure Protection (CIP) Against Cyber-attacks: The Importance of the TSA Aviation Industry Announcement</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<p><strong>By: Chuck Mackey, Director of Cybersecurity Consulting, Fortress Security Risk Management</strong></p>
</div>
</div>



<p>It’s a sad and dangerous fact: cyber-attacks on airports and airlines are increasing in frequency, sophistication, and severity. Here is a small, recent sample:</p>



<ul class="wp-block-list">
<li>The South Carolina Department of Revenue reported a cyber-attack that impacted several airports in the state, including Charleston International Airport and Greenville-Spartanburg International Airport.</li>



<li>Kansas Department of Transportation reported a cyber-attack that affected the computer systems at Wichita Eisenhower National Airport and three other airports in the state.</li>



<li>The Metropolitan Nashville Airport Authority reported a cyber-attack that impacted its website and other computer systems.</li>



<li>The Port of Seattle reported a cyber-attack that affected its email system and caused flight delays at Seattle-Tacoma International Airport.</li>
</ul>



<p>There are over 19,500 airports in the United States according to the Federal Aviation Administration (FAA)<sup>1</sup> including public, private, and military. The FAA directs over 45,000 commercial flights per day throughout the U.S. To suggest that aviation security—physical and digital—is important, is a dramatic understatement.</p>



<p>Aviation is a powerhouse contributor to economic growth, supporting over $3.5 trillion to worldwide Growth Domestic Product (GDP). Employment is estimated at 65 million globally. Aviation provides military protection, transports freight, supports tourism, and provides health and humanitarian aid to all parts of the world. It is safe to say global economies would grind to a halt without aviation. Many of us experienced this during the primary months of COVID.</p>



<p>Knowing this, how does a country, let alone a community, deal with the real threats to aviation? Cyber-attacks, along with a list of man-made and natural causes, directly impact peoples’ ability to freely to move about the country.</p>



<p>The U.S. created the framework and the cross-collaboration mechanisms to work with the private sector to address the most pressing security and business continuity issues that face aviation specifically and transportation, in general. This white paper reviews the national approach to aviation safety within the identified sixteen critical industry sectors, as well as providing insight into the framework and what Fortress Security Risk Management envisions as the most appropriate security measures for aviation safety.</p>



<p><strong>Background</strong></p>



<p>Critical Infrastructure Protection (CIP) was recognized as a U.S. national priority in 1998 by then-President Bill Clinton, Executive Order 13010, establishing the Commission on Critical Infrastructure Protection. The written document is the National Infrastructure Protection Plan (NIPP).</p>



<p>A key objective of NIPP emphasized the creation of partnerships between government (federal, state, local) and the private sector. Today there are sixteen (16) critical infrastructure sectors as identified and focused on by the Cybersecurity &amp; Infrastructure Security Agency (CISA).<sup>2</sup> Beyond CIP, CISA developed and published the CISA 2023-2025 Strategic Plan.<sup>3</sup></p>



<p><strong>Transportation</strong></p>



<p>The Transportation Systems Sector (TSS) has always been a CIP priority sector. DHS<sup>4</sup> and the Department of Transportation<sup>5</sup> are formally designated as co-sector risk management agencies for transportation. This includes Aviation, Highway and Motor Carriers, Maritime, Mass-transit and Passenger Rail, Pipeline Systems, Freight Rail, Post/Shipping. It is evident Transportation has far-reaching ramifications for citizens, communities, and other key stakeholders both nationally and internationally.</p>



<p>Within TSS are resources and working groups that enable transparency, accountability, and the framework for advancing the mission and objectives of the TSS CIP. To safeguard the nation’s transportation infrastructure, this framework centers on threat identification and protection concerning acts of terrorism, natural disasters, and cyberattacks.</p>



<p>At a high level, TSS CIP most relevant principles are:</p>



<ol class="wp-block-list" type="1" start="1">
<li><strong>Risk assessment:</strong> A risk assessment is conducted to identify the potential risks and vulnerabilities of the transportation infrastructure. This helps to determine the appropriate measures to mitigate and prevent these risks.</li>



<li><strong>Coordination and collaboration:</strong> Emphasize the importance of coordination and collaboration between federal, state, and local agencies and the private sector, to enhance the security of transportation infrastructure.</li>



<li><strong>Physical security:</strong> The need for physical security measures, such as physical access control, perimeter security, and surveillance systems, to protect critical transportation infrastructure.</li>



<li><strong>Cybersecurity:</strong> Recognize the expanding threat landscape of cyber-attacks on transportation infrastructure and to prioritize the need for robust cybersecurity measures to prevent, detect, and respond to these attacks.</li>



<li><strong>Emergency preparedness:</strong> The importance of emergency preparedness and response planning to ensure that transportation infrastructure can continue to operate in the event of a crisis.</li>



<li><strong>Training and education:</strong> Addressing the importance of training and education programs to enhance the skills and capabilities of transportation industry personnel to identify and respond to threats, and to create awareness for the user population of transportation services.</li>



<li><strong>Continuity of operations:</strong> Continuity of operations planning to ensure that critical transportation infrastructure can continue to operate during and after a crisis.</li>
</ol>



<p><strong>TSA Amends Cybersecurity Programs for TSA-regulated Airports and Airport Operations</strong></p>



<p>Earlier this March, in direct response to increasing persistent cyber-centric threats, TSA issued an amendment to cybersecurity protection programs for airports and operations to bolster measures for cybersecurity, protect against infrastructure disruption, and to proactively assess their current-state efficacy toward cybersecurity compensating controls. This follows closely on similar measures outlined in October 2022, to passenger and freight rail carriers.</p>



<p>David Pekoske, TSA Administrator, said, “This amendment to the aviation security program extends similar performance-based requirements that currently apply to other (TSS CIS).”</p>



<p><strong>Fortress Security Risk Management Analysis</strong></p>



<p>A key requirement for the aviation industry is to implement stronger cybersecurity measures to protect against specific cyber threats and attacks, including ransomware attacks, phishing attempts, and other malicious activities. This includes implementing advanced security protocols, such as multi-factor authentication (MFA), data encryption, and real-time threat monitoring and response.</p>



<p>Aviation industry stakeholders must establish a robust Incident Response plan that outlines the necessary steps to take in the event of a cyber-attack. This includes having clear lines of communication and coordination between all relevant stakeholders, including airline operators, airports, government, legal, and law enforcement agencies, as necessary.</p>



<p>In further research, we found aviation industry experts are saying this amendment is long overdue and should have been something airports and operations have been doing for years.</p>



<p>Emphasis on aviation is a direct result of the aggressive focus by the current White House Administration on cybersecurity.</p>



<p>Substantiated through our work with various TSS organizations, including airports and over-the-road carriers, Fortress Security Risk Management sees the following compensating controls as must-haves to meet minimum conditions set out by this new amended agenda:</p>



<ul class="wp-block-list">
<li><strong>Develop Network Segmentation Policies and Controls: </strong>Airlines and airports are responsible for the continued operation of safe services in the event their information systems have been hacked.</li>



<li><strong>Create Access Control Measures:</strong> Mandate the implementation of technologies and cyber best practices that ensure only those that are supposed to have access to information systems are properly authenticated and authorized.</li>



<li><strong>Implement Continuous Monitoring and Detection Policies and Procedures</strong>: Airlines and airports are responsible for making sure they update and implement the proper tools and procedures that enable them to “defend, detect, and respond” to cyber-attacks.</li>



<li><strong>Cyber Hygiene:</strong> The required implementation of software patches and updates to be monitored and implemented in a “timely manner using a risk-based methodology.”</li>



<li><strong>Device Security:</strong> Calls for the implementation of proven Endpoint Detection and Response (EDR): Utilizing bonafide behavioral-based detection systems that go beyond simple anti-virus tools.</li>



<li><strong>Maturity and Capability:</strong> Proactive, ongoing assessment measured against an established framework<sup>6</sup> (NIST, ISO, CIS, etc.)</li>
</ul>



<p></p>



<p><strong>About Fortress:</strong>&nbsp;<br>Fortress Security Risk Management protects companies&nbsp;from the financial, operational, and emotional trauma of&nbsp;cybercrime by&nbsp;enhancing&nbsp;the performance of their people, processes, and technology.&nbsp;&nbsp;</p>



<p>Offering a robust, co-managed solution to enhance an internal IT team’s capability and capacity, Fortress Security Risk Management features a full suite of managed security services (24/7/365 U.S. based monitoring, cyber hygiene (managed patching),&nbsp; endpoint detection and response (EDR), and air-gapped and immutable cloud backups) plus specialized services like Cybersecurity-as-a-Service, Incident Response including disaster recovery &amp; remediation, M&amp;A cyber due diligence, GRC advisory, identity &amp; access management, threat intelligence, vulnerability assessments, and technical testing.&nbsp;With headquarters in Cleveland, Fortress supports companies with both domestic and international operations.&nbsp;</p>



<p>In Case of Emergency:&nbsp;<br><strong>Cyber Attack Hotline: 888-207-0123 | Report an Attack: IR911.com&nbsp;&nbsp;</strong></p>



<p>For Preventative and Emergency Resources, please visit:&nbsp;<br><a href="https://ransomwareclock.org/" target="_blank" rel="noreferrer noopener"><strong>RansomwareClock.org</strong></a></p>



<div style="height:29px" aria-hidden="true" class="wp-block-spacer"></div>



<p><sup>1</sup>FAA: The&nbsp;Federal Aviation Administration&nbsp;(FAA) is the largest transportation agency of the U.S. government and regulates all aspects of&nbsp;civil aviation&nbsp;in the country as well as over surrounding&nbsp;international waters.</p>



<p><sup>2</sup>CISA: <a href="https://www.cisa.gov/">Home Page | CISA</a></p>



<p><sup>3</sup>CISA Strategic Plan: <a href="https://www.cisa.gov/resources-tools/resources/2023-2025-strategic-plan">2023-2025 Strategic Plan | CISA</a></p>



<p><sup>4</sup>Department of Homeland Security: <a href="https://www.dhs.gov/">Home | Homeland Security (dhs.gov)</a> </p>



<p><sup>5</sup>Department of Transportation: <a href="https://www.transportation.gov/">Department of Transportation</a></p>



<p><sup>6</sup>Security Framework: A defined approach to understanding an organization’s current risk profile and establishing a plan of action and roadmap for remediation.</p>



<p></p>
<p>The post <a href="https://fortresssrm.com/white_papers/bolstering-us-critical-infrastructure-protection-tsa-aviation/">Bolstering U.S. Critical Infrastructure Protection (CIP) Against Cyber-attacks: The Importance of the TSA Aviation Industry Announcement</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Living off the Land: How Threat Actors are Leveraging Remote Management Tools in Cyber Attacks</title>
		<link>https://fortresssrm.com/white_papers/living-off-the-land-how-threat-actors-are-leveraging-remote-management-tools/</link>
		
		<dc:creator><![CDATA[Fortress SRM]]></dc:creator>
		<pubDate>Thu, 11 May 2023 17:45:35 +0000</pubDate>
				<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?post_type=white_papers&#038;p=1187</guid>

					<description><![CDATA[<p>By: Will Hudec, Director, Incident Response, Fortress Security Risk Management In cybersecurity, the term &#8220;living off the land&#8221; refers to a type of attack technique that enables an attacker to ...</p>
<p>The post <a href="https://fortresssrm.com/white_papers/living-off-the-land-how-threat-actors-are-leveraging-remote-management-tools/">Living off the Land: How Threat Actors are Leveraging Remote Management Tools in Cyber Attacks</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<p><strong>By: Will Hudec, Director, Incident Response, Fortress Security Risk Management</strong></p>
</div>
</div>



<p>In cybersecurity, the term &#8220;living off the land&#8221; refers to a type of attack technique that enables an attacker to evade security software detection while blending into the victim’s network, using legitimate tools and utilities that are already installed on the target system instead of using malicious software. Some examples of tools that can be used for &#8220;living off the land&#8221; attacks include PowerShell, Remote Management Tools, Windows Management Instrumentation (WMI), and Remote Desktop Protocol (RDP). This attack technique has become increasingly popular among cybercriminals and state-sponsored hacking groups.</p>



<p>Remote management tools are software programs that allow remote control and management of a device or network. They are widely used in IT environments as they offer many benefits such as reduced costs, increased productivity, and better efficiency. However, remote management tools also present a significant security risk as threat actors can exploit them to conduct sophisticated malicious activities.</p>



<p>A CrowdStrike analysis of the threat landscape and adversary universe revealed that 6 in 10 detections (62%) indexed by the CrowdStrike Security Cloud in the final quarter of 2021 were malware-free. Instead, adversaries were leveraging legitimate credentials and built-in tools — a hallmark of living off the land attacks — to advance the attack path. CISA (Cybersecurity and Infrastructure Security Agency) issued a <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-025a">joint advisory</a> earlier this year warning organizations of the increase of this threat</p>



<p>Threat actors use remote management tools for various insidious purposes, such as:</p>



<ol class="wp-block-list" type="1" start="1">
<li><strong>Gaining unauthorized access to a system</strong>. Threat actors can use remote management tools to gain access to a system without needing to physically be in the same location as the targeted device. This is particularly useful for threat actors who operate from a different country or region than their target.</li>



<li><strong>Evading detection</strong>. Remote management tools are legitimate software programs that are commonly used in IT environments, making it difficult for security software to detect their use. This makes it easier for threat actors to remain undetected while conducting their malicious activities.</li>



<li><strong>Persistence</strong>. Threat actors can use remote management tools to establish persistence on a system. By creating a backdoor using a remote management tool, they can maintain access to the system even if other malware is detected and removed.</li>



<li><strong>Moving laterally</strong>. Remote management tools can be used to move laterally within a network. Once access has been gained to one device, threat actors can use remote management tools to move to other devices within the same network.</li>
</ol>



<p>Recent “Living off the Land” examples:</p>



<p><strong>Solar Winds</strong></p>



<p>In the SolarWinds supply chain attack which was discovered in December 2020, threat actors compromised SolarWinds&#8217; Orion software, which is a remote management tool used by thousands of organizations. The attackers then used this tool to gain access to various organizations, including U.S. government agencies, by installing a backdoor that allowed them to move laterally within the network.</p>



<p><strong>Colonial Pipeline</strong></p>



<p>The attackers used a virtual private network (VPN) account with an unused username and password that they had purchased on the dark web to gain access to this major U.S. pipeline’s network. Using a remote management tool, they moved laterally within the network and installed ransomware on various systems leading to a shutdown of the pipeline and a gas shortage in the Southeastern United States.</p>



<p><strong>Conclusion</strong></p>



<p>By offering an easy and effective way to gain unauthorized access to a system, evade detection, establish persistence, and move laterally within a network, remote management tools are a growing and dangerous trend.</p>



<p>As hybrid and remote work becomes more prevalent, the use of remote management tools is likely to increase, and organizations need to take the necessary steps to secure these tools to thwart attacks. This includes implementing multi-factor authentication, limiting access to remote management tools, and monitoring their use for suspicious activity.</p>



<p>There are several actions that organizations can take now to mitigate the risk of attacks that utilize remote management tools:</p>



<ol class="wp-block-list" type="1" start="1">
<li><strong>Limit access to remote management tools</strong>. Organizations should limit access to remote management tools only to authorized personnel who require it for their job functions. This can help reduce the risk of unauthorized access and misuse of the tools.</li>



<li><strong>Implement multi-factor authentication</strong>. Organizations should require multi-factor authentication for remote management tools. This can help prevent unauthorized access even if an attacker has obtained a valid username and password.</li>



<li><strong>Remove local admin rights</strong>. Organizations should not allow users to install applications on their systems without proper approval and oversight. Implementing systems such as Microsoft LAPS can assist with mitigating unapproved software being installed on a device.</li>



<li><strong>Monitor remote management tool activity</strong>. Organizations should monitor the use of remote management tools for any suspicious activity, such as unauthorized logins or unusual commands.</li>



<li><strong>Keep remote management tools updated</strong>. Organizations should ensure that remote management tools are updated to the latest version and patches. This can help reduce the risk of known vulnerabilities being exploited by threat actors.</li>



<li><strong>Conduct regular security assessments</strong>. Organizations should conduct regular security assessments to identify vulnerabilities in their networks and systems. This can help identify any potential weaknesses that threat actors may exploit.</li>



<li><strong>Implement network segmentation</strong>. Organizations should implement network segmentation to limit the lateral movement of threat actors within the network. This can help prevent an attacker from moving laterally within the network and accessing sensitive data or systems.</li>



<li><strong>Train employees on cybersecurity best practices</strong>. Organizations should train their employees on cybersecurity best practices, such as how to recognize and report suspicious activity, how to create strong passwords, and how to identify phishing emails. This can help reduce the risk of human error leading to a successful attack.</li>
</ol>



<p>By implementing these recommendations, organizations can reduce the risk of attacks that utilize remote management tools and better protect their networks and systems. It is important for organizations to stay vigilant and proactive in their cybersecurity efforts to stay ahead of evolving threats and prevent the bad guys from “living off the land.”</p>



<p>If you’d like to have a confidential conversation with one of our cybersecurity experts to improve your cyber safety, we’re here to help.</p>



<p><strong>About Fortress:</strong>&nbsp;<br>Fortress Security Risk Management protects companies&nbsp;from the financial, operational, and emotional trauma of&nbsp;cybercrime by&nbsp;enhancing&nbsp;the performance of their people, processes, and technology.&nbsp;&nbsp;</p>



<p>Offering a robust, co-managed solution to enhance an internal IT team’s capability and capacity, Fortress Security Risk Management features a full suite of managed security services (24/7/365 U.S. based monitoring, cyber hygiene (managed patching),&nbsp; endpoint detection and response (EDR), and air-gapped and immutable cloud backups) plus specialized services like Cybersecurity-as-a-Service, Incident Response including disaster recovery &amp; remediation, M&amp;A cyber due diligence, GRC advisory, identity &amp; access management, threat intelligence, vulnerability assessments, and technical testing.&nbsp;With headquarters in Cleveland, Fortress supports companies with both domestic and international operations.&nbsp;</p>



<p>In Case of Emergency:&nbsp;<br><strong>Cyber Attack Hotline: 888-207-0123 | Report an Attack: IR911.com&nbsp;&nbsp;</strong></p>



<p>For Preventative and Emergency Resources, please visit:&nbsp;<br><a href="https://ransomwareclock.org/" target="_blank" rel="noreferrer noopener"><strong>RansomwareClock.org</strong></a><strong><u></u></strong></p>
<p>The post <a href="https://fortresssrm.com/white_papers/living-off-the-land-how-threat-actors-are-leveraging-remote-management-tools/">Living off the Land: How Threat Actors are Leveraging Remote Management Tools in Cyber Attacks</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
