BitDepthFeatured

What keeps regional cybersecurity experts awake at night

4 Mins read
  • Unpatched systems, especially older versions of Windows, are highly vulnerable to exploits.
  • No single solution can provide complete protection; multiple layers of defense are necessary.
  • Companies are using unsecured channels like WhatsApp, exposing themselves to potential security breaches.

Above: AI Illustration from 123RF.com

BitDepth#1489 for 16 December

The panel discussion that comprised the second half of the ISC2 Scam Defence seminar on November 30 made clear some of the challenges that regional cybersecurity experts face.

Those hurdles include a reluctance to retire aging, vulnerable equipment, fundamental misunderstandings by C-Suite management about areas of digital weakness and poorly implemented network security regimes.

Dark web researcher and penetration tester Shiva Parasram explained the history of the EternalBlue exploit, created by the National Security Agency of the US government.

The NSA engineered the exploit in 2012 to access computers running then current versions of Microsoft Windows but didn’t tell the company anything about it until 2017, when the Shadow Brokers, a hacker group, got hold of the code and released it widely.

Microsoft quickly engineered and released a patch, but unpatched systems remained vulnerable and the WannaCry virus used the exploit to spread, causing millions in damage and downtime.

If the vulnerability remains unpatched on a modern system, the likelihood of a successful breach is close to 100 percent.

Microsoft took the unfortunate step of first releasing the patch to users running then current versions of Windows and customers on the company’s thousand dollar extended service contract.

Shiva Parasram, Photo by Mark Lyndersay.

The patch was eventually released widely and for free for systems running Windows XP and up.

“It’s a bit worrying because there are a lot of systems that still run [older] applications and you can’t upgrade them,” said Parasram.

“If I were to jump on a Kali Linux system and I found one of those older systems on Windows 7 or Server 2000 it would take two to five minutes to fully compromise the system. There are hundreds of thousands of exploits out there and it’s pretty tough to defend against them all.”

“In a network, there are lot of vulnerabilities and they can happen at different levels of your technology,” said Ajmal Nazim, cybersecurity consultant and systems auditor.

“If you look at the the traditional OSI (Open Systems Interconnection) stack, you have seven layers from physical all the way up to the web applications, and each one of these stacks is going to be susceptible to vulnerabilities.”

“You have to have a holistic approach. There’s no single solution that will give you overall protection.”

“You have multiple layers. And should one of them fail, then you’re hoping the others will stop the hacker from getting in.”

Whether the attack comes from a successful external attempt, exploiting a vulnerability or from inside, perhaps a disgruntled employee, an exploit needs just one vulnerability.

The attack can then move laterally throughout the network and through an escalation of privileges, can compromise the entire network. They will encrypt your entire network, they will exfiltrate data. They will demand a ransom.

“Companies will think that once they have a firewall in, then they have done what’s needed,” Nazim said.

“The firewall is your perimeter, it’s your first line of defense. But once you get inside of the network. then you need defenses and a proper segmentation of the network.”

“So if they do breach the perimeter, then it shouldn’t be that it’s a free for all on your internal network, no matter how big it is. The infrastructure should be properly segmented so if anything they’ll only get into one segment.”

Scofield Thomas and Ajmal Nazir. Photo by Mark Lyndersay.

Scofield Thomas, Managing Director of 800-TECH offered examples of worrying real world experiences.

In one instance, he found a client running the business without a firewall. “It was giving trouble, it was blocking things, so we took it out,” was the response.

“I recently spoke with a new client who is running Microsoft Server 2003,” Thomas said.

“It’s a critical industry that they’re in and this server is vulnerable. The issue is about two things, supporting this core, legacy application that they feel the need to hold on to that they can’t upgrade. Then there is the cost.”

“You have this critical information on a server that is unpatched. These are the small mistakes that you make. You think you’re being budget conscious, but in the end the reputational damage and expense can be immense.”

“I’m trying to understand why a lot of companies don’t utilize encrypted emails or an encrypted e-mail service because the type of information that they send over insecure channels is crazy and they are exposing themselves to a man-in-the-middle attack.”

“These are the kind of things that we see happening more consistently. I’ll have a client who wants to pay for a subscription service, I’ll say hey, I’ll help you out next time.Then you send me all your credit card information via WhatsApp.”

“These are the practices that we have to stop. We need to understand that these channels are not secure.”

“At one company that we represent, one of the C-Suite people who approves financial transactions comes to me and says I have these seven missed calls back-to-back. I keep saying hello, hello, hello. Is anybody there? I called my cybersecurity engineer and he explained that it’s a deep fake. They’re trying to capture his voice and run it through AI to use it make a call [masquerading as] him for approvals.”

Parasram noted the increased presence of information stealers like Lumma, which target cryptocurrency wallets and two-factor authentication browser extensions to steal sensitive personal information from a victim’s machine.

Keisha Lashley. Photo by Mark Lyndersay.

“Ever notice that every single time you try to log back in, you’re not asked to provide [authentication credentials]? It’s stored in a session, and information stealers capture your username, your password, they steal the actual session that you’re working on.”

“That information is sold to other companies and there are hundreds of forums on the dark web. Sometimes it’s sold, sometimes it’s given. There was a Telegram group for the Redline information stealer. That was taken down recently. They were selling access for US$100 per month.”

“There were around 32 big leaks in the Caribbean for 2023. Terabytes of information are definitely out there. That includes things like your bio data scans for your passport, utility bills, letters requesting services.”

“The thing that keeps us awake is just the potential of the threat actor to just blend in with the regular traffic on the network, said Keisha Langley, cybersecurity specialist, CBTT.

“In our ongoing monitoring, things that fall outside of what is normal for our operations are key things we have to keep our eye on because we know that they can really just blend in very easily. The good guys (white hat penetration testers) show us so that we can get better.”

“But I just think it’s important for us just to look at a number of different things and different potential indicators when we’re monitoring our environments.”

What keeps regional cybersecurity experts awake at night

What keeps regional cybersecurity experts awake at night

Whether the attack comes from a successful external attempt, exploiting a vulnerability or from inside, perhaps a disgruntled employee, an exploit needs just one vulnerability.
Read More
Where hackers begin

Where hackers begin

Digital nation strategies have been released by 170 countries and regions and more than 60 countries have elevated AI in their national strategy.
Read More
Blue skies for microblogging?

Blue skies for microblogging?

Bluesky hit its current high of 23 million users faster than expected, but it’s way behind X.
Read More
The apps that thrive in Apple’s ecosystem

The apps that thrive in Apple’s ecosystem

By Apple's own yardstick an app that shares usable data across three devices is acceptable one that synchronises with four is a winner.
Read More
America’s open mic moment

America’s open mic moment

What made online pundits so effective in the US election?
Read More
The press and the president-elect

The press and the president-elect

Beyond the president-elect's often-expressed intent to retaliate against journalists he believes are unfairly attacking him is the agenda of Project 2025.
Read More
All washed up

All washed up

Dirt on its own will simply shake out of fabric. What keeps it in place is oil and grease, readily generated by human skin.
Read More
The state of Caribbean digital transformation

The state of Caribbean digital transformation

Despite 87 per cent believing that digital will disrupt their industry, 87 per cent acknowledged that they don't have the right leaders
Read More
The WordPress War

The WordPress War

WPEngine and the websites of its customers were blocked from the WordPress log-in system theme and plug-in updates and other background processes that enable a Wordpress website.
Read More
A budget of concrete and asphalt

A budget of concrete and asphalt

Four years after Hassel Bacchus took up the pioneering role of Digital Transformation Minister, the 2025 budget could not identify any completed transformation project that's positively affected citizens.
Read More
Arima’s first step toward becoming a smart city

Arima’s first step toward becoming a smart city

The public WiFi was officially activated on September 28 at the hospital, and it's fast. A local ping registered 250 megabits of download speed and 126 for upload.
Read More
Now hear this!

Now hear this!

Budget headsets will effectively dampen ambient sounds, but tend to be an all or nothing solution.
Read More
A taxing time for all

A taxing time for all

Tax collection began using the least customer-friendly interface imaginable, lines outside a government building.
Read More
Mobile devices, a war of increments

Mobile devices, a war of increments

Mixing and matching the two rival ecosystems is essentially impossible, so it's the utility of the products combined that makes the biggest difference.
Read More
Why cash is king in Trinidad and Tobago

Why cash is king in Trinidad and Tobago

In 2017, 16 per cent of users owned a credit card, a figure that dropped to 15 per cent by 2023.
Read More
I shopped at Temu!

I shopped at Temu!

Temu is great fun to explore and offers many bargains but product quality can be wildly variable.
Read More
What’s needed to make e-Governance happen?

What’s needed to make e-Governance happen?

“If we look at successful governments that have achieved a certain level in of success in these programs, some things stand out."
Read More
Changing the education conversation

Changing the education conversation

There are local schools that aspire to continuous improvement and others that struggle to make it through a working day without bloodshed.
Read More
Practical steps to reducing cybersecurity risks

Practical steps to reducing cybersecurity risks

The process, to be effective, must be ongoing and managed to ensure that vendors meet required standards.
Read More
The consequences of careless code

The consequences of careless code

The cruel reality of Crowdstrike is that it wasn't a cybersecurity attack. It was a quality of service lapse and the incident puts IT professionals in an odd space.
Read More
What keeps regional cybersecurity experts awake at night What keeps regional cybersecurity experts awake...
Where hackers begin Where hackers begin
Blue skies for microblogging? Blue skies for microblogging?
The apps that thrive in Apple’s ecosystem The apps that thrive in Apple’s...
America’s open mic moment America’s open mic moment
The press and the president-elect The press and the president-elect
All washed up All washed up
The state of Caribbean digital transformation The state of Caribbean digital transformation
The WordPress War The WordPress War
A budget of concrete and asphalt A budget of concrete and asphalt
Arima’s first step toward becoming a smart city Arima’s first step toward becoming a...
Now hear this! Now hear this!
A taxing time for all A taxing time for all
Mobile devices, a war of increments Mobile devices, a war of increments
Why cash is king in Trinidad and Tobago Why cash is king in Trinidad...
I shopped at Temu! I shopped at Temu!
What’s needed to make e-Governance happen? What’s needed to make e-Governance happen?
Changing the education conversation Changing the education conversation
Practical steps to reducing cybersecurity risks Practical steps to reducing cybersecurity risks
The consequences of careless code The consequences of careless code

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
BitDepthFeatured

Where hackers begin

3 Mins read
Digital nation strategies have been released by 170 countries and regions and more than 60 countries have elevated AI in their national strategy.
Press Releases

Samsung extends Knox security to its home appliances

2 Mins read
Knox Matrix is a security solution that comprehensively protects connected devices and networks using private blockchain technology.
BitDepthFeatured

Practical steps to reducing cybersecurity risks

4 Mins read
The process, to be effective, must be ongoing and managed to ensure that vendors meet required standards.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
×
BitDepthFeatured

Where hackers begin

0
Share your perspective in the comments!x
()
x