58% of Ransomware Attacks Were Due to Breached Perimeter Security Appliances

Cyber insurance and security services company Coalition has a new report that pointed out the most frequent preliminary access vectors in ransomware attacks. According to a review of claims, Coalition identified compromised perimeter security devices like a virtual private network (VPN) or firewall as the most frequently used technology in 6 of 10 ransomware attacks. The most frequently compromised products were perimeter security devices from Cisco, Fortinet, Palo Alto, and SonicWall Networks. Two of the 10 ransomware attacks involved remote desktop software programs. 80% of the attacks involved Microsoft’s Remote Desktop Protocol (RDP). Email was the 3rd most exploited solution, and most email-linked breaches were caused by social engineering attempts like phishing.

The most frequent attack vector was compromised credentials, usually for VPNs and RDP, which give threat actors privileged use of internal systems. A review of activity records showed that 42% of attacks employed brute force tactics. The attackers had thousands of unsuccessful attempts before guessing the right username and password. Credentials may be compromised in different ways, like through phishing attacks or malware infections. Although Coalition could not exactly know how credentials were exposed in non-brute force attacks, new reports from cybersecurity companies have pointed out the growing threat from info stealer malware. Microsoft reported recently about an infostealer campaign by the Storm-0408 threat group, which uses malvertising to reroute users to malware uploaded on GitHub. Microsoft monitored a million infostealer infections through the campaign.

To use compromised credentials, at least one online-exposed login panel is necessary. Information from customers seeking cyber insurance indicated that 65% had a minimum of one exposed login section. The following are the most frequently discovered exposed logins:

  • Cisco VPN+ gadgets (10%)
  • Sonicwall VPNs (9%)
  • Microsoft email (8%)
  • VPNs and VPN+ devices from Palo Alto Networks
  • Fortinet and Citrix (6%-7%).

Compromised credentials for a Citrix panel with no multifactor authentication allowed BlackCat ransomware to access Change Healthcare’s system in February 2024. As per the Coalition, Citrix panels with the wrong configuration resulted in around $1 billion losses in 2024, higher than the other CVE.

The most popular are CVEs in Fortinet, Ivanti, and Cisco system devices, and Microsoft’s Exchange Email Server vulnerabilities. The second most popular attack vector was vulnerability exploits. Many vulnerabilities were exploited for preliminary access. The third most popular attack vector was social engineering, using email to contact employees. These attacks stole credentials through phishing, deceiving workers into downloading malware under the guise of genuine software or using drive-by malware downloads, and simply deceiving workers into setting up remote access software programs, just like in tech support scams.

Based on Coalition, the best way to protect against ransomware attacks is to target the riskiest safety issues to lessen the possibilities of a breach. That means keeping track of the attack surface to identify breached login panels and services, repairing zero-day vulnerabilities in Internet-facing technology immediately, providing cybersecurity and HIPAA training to employees, employing 24/7 tracking of systems, and responding immediately to any possible breach.

Tags

Daniel Lopez

Daniel Lopez

Daniel Lopez stands out as an exceptional HIPAA trainer, dedicated to elevating standards in healthcare data protection and privacy. Daniel, recognized as a leading authority on HIPAA compliance, serves as the HIPAA specialist for Healthcare IT Journal. He consistently offers insightful and in-depth perspectives on a wide range of HIPAA-related topics, addressing both typical and complex compliance issues. With his extensive experience, Daniel has made significant contributions to multiple publications such as hipaacoach.com, ComplianceJunction, and The HIPAA Guide, enriching the field with his deep knowledge and practical advice in HIPAA regulations. Daniel offers a comprehensive training program that covers all facets of HIPAA compliance, including privacy, security, and breach notification rules. Daniel's educational background includes a degree in Health Information Management and certifications in data privacy and security. You can contact Daniel via HIPAAcoach.com.

Get The FREE HIPAA Checklist

Discover everything you need to become HIPAA compliant

Get the free newsletter

Discover everything you need to become HIPAA compliant
Please enable JavaScript in your browser to complete this form.
Name

Get The FREE HIPAA Checklist

Discover everything you need to become HIPAA compliant
Please enable JavaScript in your browser to complete this form.
Name