Privacy

As war escalates in Europe, it’s ‘shields up’ for the cybersecurity industry

Comment

Cropped Hand Holding Umbrella During Rainfall
Image Credits: Rosley Majid / EyeEm / Getty Images

Yaron Tal

Contributor
CTO and founder of Reposify, Yaron Tal is a tech entrepreneur and cybersecurity expert with nearly two decades of experience developing cybersecurity software solutions.

In unprecedented times, even government bureaucracy moves quickly. As a result of the heightened likelihood of cyberthreat from Russian malactor groups, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) — part of the Department of Homeland Security — issued an unprecedented warning recommending that “all organizations — regardless of size — adopt a heightened posture when it comes to cybersecurity and protecting their most critical assets.”

The blanket warning is for all industries to take notice. Indeed, it’s a juxtaposition of sorts to think the cybersecurity industry is vulnerable to cyberattack, but for many nation state groups, this is their first port of call.

Inspired by the spike in attacks on cybersecurity agencies globally, a report from Reposify assessed the state of the cybersecurity industry’s external attack surface (EAS). It coincides with CISA’s warning, and highlights critical areas of concern for the sector and how they mirror trends amongst pharmaceutical and financial companies, providing vital insight into where organizations can focus their efforts, and reinforce the digital perimeter.

The report examined 35 cybersecurity companies and their 350+ subsidiaries with shocking results: during only a two-week period in January 2022, more than 200,000 exposed assets were uncovered at top firms, 42% of which were identified as high-severity issues.

As CISA outlines in its “Shields Up” guidance, the first step to resiliency is to reduce the likelihood of a damaging cyber intrusion in the first place. Recognizing the problem is only the first in a series of actionable moves organizations can make to minimize their external weaknesses to bad actors.

If addressing digital perimeter exposures is the foundation, zoning-in on problem areas is the framing. A deep dive into these deficiencies points to clear solutions all industries – cybersecurity or otherwise – can embrace to protect themselves.

What do companies need to do?

Many factors, including the transition to remote work environments, increased reliance on third-party vendors, digital transformation and offloading services onto the cloud, have significantly increased companies’ external attack surface.

According to the report, the rise of remote access sites saw 89% of identified assets classified as part of the unofficial perimeter. Similarly, 87% of databases were unaccounted for, along with 67% of development tools and 62% of all network assets.

Databases were found to be among the most vulnerable to cybersecurity threat, with over half (51%) of cybersecurity companies hosting an exposed database. Nearly all (97.14%) of security agencies have exposed assets on their Amazon Web Services (AWS), and 86% of those analyzed have at least one sensitive remote access service exposed to the internet.

Now that the problem areas have been identified – remote access servers, open network computing remote procedure call (ONC RPCs), service message block services, and databases among them — the best tool in any CISOs arsenal is anticipation and mitigation.

Leveraging cybersecurity best practices across infrastructure, applications and user management should be the first port of call before deploying tools to support in minimizing an organization’s EAS.

Best practice for OpenSSH and remote access servers like RDP and Telnet is to ensure access only via VPN. This provides critical protection through proxy walls and will properly shield internal data. Furthermore, ONC RPCs like Portmapper should only service data on internal networks (intranet). If it holds any two-way connection to the internet, it should be bound only to non-confidential data.

Unmaintained web servers (e.g., Apache, NGINX and IIS) also represent a major risk to any organization, potentially exposing networks to exploitations that could result in a data leak or remote code execution (RCE).

Similarly, databases are today’s treasure chests. Without adequate protection via MFA, SSO, VPN or proxy, valuable corporate information, intellectual property and privacy data could all be lost to the work of malactors. Exposed storage and backup sites like FTP, rsync, S3 and Azure Blob should be stored off public IP to prevent a doorway for cyber-attack, as opportunists could use this as a means to compromise or tamper with corporate data, potentially leveraging ransomware to generate profit.

DevOps tools where companies may store software and information-critical documents should, at the very least, leverage two-factor authentication for employee use. Ensuring these tools, and web servers, are patched with the latest software is another example of simple-fix companies can use to protect themselves and minimize their EAS.

In the same vein, the reliance on cloud computing can potentially put company assets at risk. Contrary to popular belief, the onus to protect cloud data falls on the customer, not the service provider.

There are a number of ways corporations can become vulnerable through cloud service providers: Incomplete control over who can access sensitive data, cloud misconfiguration, cloud applications provisioned outside IT visibility, lack of staff with skills to manage security for cloud applications, among others.

We’ve anticipated and mitigated. Now what?

Even with these critical steps, the EAS still exists and is therefore not immune to threat. EASM tools can help. Before, online assets had to be cleared and itemized by a central IT team. Now, product, marketing and technology teams have the ability to create and own online assets – everything from test pages to entire databases – often without informing IT departments.

In addition to rendering central control of asset inventory near useless, decentralization of asset management has brought about significant changes in the types of threats that organizations can expect, and highlighted an issue for every industry: human error.

For maximum effectiveness, assets must be continuously monitored in real time. Often, subsidiaries and partner companies are overlooked when mapping the external attack surface. Critical asset identification must extend to all associated companies.

This is particularly important in the case of mergers and acquisitions, where a parent company may overlook critical exposed assets at a subsidiary. If the chosen EASM tool can’t recognize the link between the two companies, an unknown asset becomes far more likely to be exploited and could become a significant cybersecurity threat.

The cybersecurity industry is no exception to human error

At the end of the day, security company CISOs are no different from those in any other industry. They, too, are subject to budgeting issues that may not allow for adequate infosec resources, leaving small teams to manage a growing number of assets.

Automated cybersecurity tools are thrown at problems as a half-hearted fix, potentially creating new attack vectors in the process. It’s a lot to keep track of for anyone, and so, human error kicks in and systems are unintentionally missed or overlooked.

As reinforced by CISA’s “Shields Up” warning, we live in a world where cybercrime is a weapon to be yielded. Battles are being fought online in retaliation to sanctions, or other penalties, often alongside ground or fiscal war.

Cybersecurity companies house valuable assets of U.S. businesses, and we must do everything in our power to protect them. We can begin with our digital perimeter by being watchful, ultimately leading to a safer world for all.

To read “The State of External Attack Surface 2022” report, click here (registration required).

More TechCrunch

Welcome back to TechCrunch Mobility — your central hub for news and insights on the future of transportation. Sign up here for free — just click TechCrunch Mobility! Your usual…

Inside Fisker’s collapse and robotaxis come to more US cities

New York-based Revel has made a lot of pivots since initially launching in 2018 as a dockless e-moped sharing service. The BlackRock-backed startup briefly stepped into the e-bike subscription business.…

Revel to lay off 1,000 staff ride-hail drivers, saying they’d rather be contractors anyway

Google says apps offering AI features will have to prevent the generation of restricted content.

Google Play cracks down on AI apps after circulation of apps for making deepfake nudes

The British retailers association also takes aim at Amazon’s “Buy Box,” claiming that Amazon manipulated which retailers were selected for the coveted placement.

UK retailers file a £1.1B collective action against Amazon over claims of data misuse

Featured Article

Rivian overhauled the R1S and R1T to entice new buyers ahead of cheaper R2 launch

Rivian has changed 600 parts on its R1S SUV and R1T pickup truck in a bid to drive down manufacturing costs, while improving performance of its flagship vehicles.  The end goal, which will play out over the coming year, is an existential one. Rivian lost about $38,784 on every vehicle…

1 hour ago
Rivian overhauled the R1S and R1T to entice new buyers ahead of cheaper R2 launch

Twitch has come up with a solution for the ongoing copyright issues that DJs encounter on the platform. The company announced Thursday a new program that enables DJs to stream…

Twitch DJs will now have to pay music labels to play songs in livestreams

Google said today it is partnering with RapidSOS, a platform for emergency first responders, to enable users to contact 911 through RCS (Rich Messaging Service).

Google partners with RapidSOS to enable 911 contact through RCS

Long before product-led growth became a buzzword, Atlassian offered free tiers for virtually all of its productivity and developer tools. Today, that mostly means free access for up to ten…

Atlassian now gives startups a year of free access

Featured Article

A social app for creatives, Cara grew from 40k to 650k users in a week because artists are fed up with Meta’s AI policies

Artists have finally had enough with Meta’s predatory AI policies, but Meta’s loss is Cara’s gain. An artist-run, anti-AI social platform, Cara has grown from 40,000 to 650,000 users within the last week, catapulting it to the top of the App Store charts. Instagram is a necessity for many artists,…

2 hours ago
A social app for creatives, Cara grew from 40k to 650k users in a week because artists are fed up with Meta’s AI policies

Google has developed a new AI tool to help marine biologists better understand coral reef ecosystems and their health, which can aid in conversation efforts. The tool, SurfPerch, created with…

Google looks to AI to help save the coral reefs

Only a few years ago, one of the hottest topics in enterprise software was ‘robotic process automation’ (RPA). It doesn’t feel like those services, which tried to automate a lot…

Tektonic AI raises $10M to build GenAI agents for automating business operations

SpaceX achieved a key milestone in its Starship flight test campaign: returning the booster and the upper stage back to Earth.

SpaceX launches mammoth Starship rocket and brings it back for the first time

There’s a lot of buzz about generative AI and what impact it might have on businesses. But look beyond the hype and high-profile deals like the one between OpenAI and…

Sirion, now valued around $1B, acquires Eigen as consolidation comes to enterprise AI tooling

Carlo Kobe and Scott Smith believed so strongly in the need for a debit card product designed specifically for Gen Zers that they dropped out of Harvard and Cornell at…

Kleiner Perkins leads $14.4M seed round into Fizz, a credit-building debit card aimed at Gen Z college students

A new app called MyGlimpact is intended not only to help people understand their environmental footprint, but why they shouldn’t feel guilty about it.

How many Earths does your lifestyle require?

Prolific Machines believes it has a way of transitioning away from molecules to something better: light.

Prolific Machines, with a $55M Series B, shines ‘light’ on a better way to grow lab proteins for food and medicine

It’s been 20 years since Shira Yevin, the lead singer of punk band Shiragirl drove a pink RV into the Vans Warped Tour grounds, the now-defunct punk rock festival notorious…

Punk singer Shira Yevin pushes for fair pay with InPink, a women-focused job marketplace

While the transport industry does use legacy software, many of these platforms are from an earlier era. Qargo hopes its newer technologies can help it leapfrog the competition.

Qargo raises $14M to digitize and decarbonize the trucking industry

When you look at how generative AI is being implemented across developer tools, the focus for the most part has been on generating code, as with Github Copilot. Greptile, an…

Greptile raises $4M to build an AI-fueled code base expert

The models tended to answer questions inconsistently, which reflects biases embedded in the data used to train the models.

Study finds that AI models hold opposing views on controversial topics

A growing number of businesses are embracing data models — abstract models that organize elements of data and standardize how they relate to one another. But as the data analytics…

Cube is building a ‘semantic layer’ for company data

Stock-trading app Robinhood is diving deeper into the cryptocurrency realm with the acquisition of crypto exchange Bitstamp.

Robinhood acquires global crypto exchange Bitstamp for $200M

Torpago’s Powered By product is geared for regional and community banks, with under $20 billion in assets, to launch their own branded cards and spend management programs.

Fintech Torpago has a unique way to compete with Brex and Ramp: turning banks into customers

Over half of Americans wear corrective glasses or contact lenses. While there isn’t a shortage of low-cost and luxury frames available online or in stores, consumers can only buy them…

Eyebot raised $6M for AI-powered kiosks that provide 90-second vision exams without an optometrist

Google on Thursday said it is rolling out NotebookLM, its AI-powered note-taking assistant, to over 200 new countries, nearly six months after opening its access in the U.S. The platform,…

Google’s updated AI-powered NotebookLM expands to India, UK and over 200 other countries

Inflation and currency devaluation have always been a growing concern for Africans with bank accounts.

Starting in war-torn Sudan, YC-backed Elevate now provides fintech to freelancers globally

Featured Article

Amazon buys Indian video streaming service MX Player

Amazon has agreed to acquire key assets of Indian video streaming service MX Player from the local media powerhouse Times Internet, the latest step by the e-commerce giant to make its services and brand popular in smaller cities and towns in the key overseas market.  The two firms reached a…

9 hours ago
Amazon buys Indian video streaming service MX Player

Dealt is now building a service platform for retailers instead of end customers.

Dealt turns retailers into service providers and proves that pivots sometimes work

Snowflake is the latest company in a string of high-profile security incidents and sizable data breaches caused by the lack of MFA.

Hundreds of Snowflake customer passwords found online are linked to info-stealing malware

The buy will benefit ChromeOS, Google’s lightweight Linux-based operating system, by giving ChromeOS users greater access to Windows apps “without the hassle of complex installations or updates.”

Google acquires Cameyo to bring Windows apps to ChromeOS