The biggest cyber-threats hitting firms working remotely during the Covid-19 crisis

Scammers
(Image credit: Pixabay)

As the nation’s businesses hunkered down to work at home, criminal groups not only continued their attacks, but also adapted their tactics to exploit the security gaps that opened up.

Over the last few weeks, we saw an increase in attacks targeting a workforce that is now almost entirely relying on VPN connections and cloud-based applications. From consultant and investment firms to manufacturers and retailers, businesses in all sectors are under threat from attacks exploiting the Covid-19 crisis.

Here is a rundown of the biggest threats we have seen in the wild, and what organisations can do to protect themselves.

VPN brute-force attacks

It has been reported that the use of VPNs skyrocketed 33 per cent in the first weeks of the lockdown. Threat actors sought to exploit this trend by targeting VPN portals with brute-force attacks – attempting to gain access with previously stolen credential lists. This method, also known as credential stuffing, relies on users recycling the same username and password combinations for different logins. If the attacker has a match from a previous breach, they will gain network access.

Watch for unusual authentication behaviour that indicates brute-force attempts. Hundreds of failed login attempts from the same IP will be a very obvious indicator, but attackers may also play the long game, requiring a more in-depth analysis that takes in different sources such as perimeter telemetry and Active Directory. In one instance, a manufacturing firm was targeted with a slow and steady attack that used multiple IPs over a longer period.

Malicious Azure apps

A recent trend involves targeting users with phishing attacks that include fake, malicious Azure application links. Azure use soared during the lockdown, with Microsoft reporting a 775 per cent increase in Azure tenants over the last month alone. This means many employees are using Azure apps to facilitate remote working for the first time, providing a prime target for phishing attacks.

Organisations need to track Azure application consent requests and watch for signs of attack. Criminals can gain network access very quickly after their victim downloads the malicious app. Time is not on your side – you need to react in real-time.  You must identify compromised accounts that begin to exhibit unusual activity. Behavioural analytics can help tip the odds in your favour.

Bypassing MFA

For many workers, the lockdown has been their first foray into remote working, leaving them particularly vulnerable to attack. Threat actors can use fake Office 365 login screens to steal credentials and authentication tokens, giving them everything they need to impersonate the user and login from their own device.

Multifactor authentication (MFA) is designed to prevent compromise through stolen credentials, but attackers can use man-in-the-middle attacks to intercept the authentication token and login from their machine.

To identify an attack in progress, keep an eye on usual activity such as simultaneous logins from different locations, as well as those that don’t match the user’s normal activity patterns. When you’re watching for unusual behaviour, you can shut it down before it escalates.

Command and control via phishing

Phishing remains a common attack vector and cybercriminals have now seized the opportunity to incorporate Covid-19 to make emails more convincing and trick users into clicking malicious links.   Doing so will download a malware payload that enables the attacker to establish a connection to their command and control (C2) server. From here, they can begin rapidly escalating their attack to gain more privileges and infiltrate the network.

To block these attacks, monitor network behaviour that resembles a C2 connection. A deep inspection of all DNS and web proxy traffic can reveal malware that is attempting to hide communication in the normal flow of traffic.

If an attacker slips through the net, behavioural analytics is one of the best ways to spot a compromised account before the attacker gains momentum.

Insider threats

Not every cyber-threat originates from outside the business. Some of the most dangerous threats originate from malicious insiders who actively seek to undermine the business for profit or due to a personal vendetta. We also often encounter insiders who harvest data to feather the nest for a position with another company, often without realising they are doing anything wrong.

To mitigate the threat, firms should first ensure they have a strong handle on the location of all sensitive data and the accounts that have permission to access it. From here, they can detect unusual activity: in one recent instance, an employee at a manufacturing firm was using a service account to browse emails that should have been out of bounds to them. We were able to determine who had been using the service account and trace the activity back to their machine.

As remote working continues to be the new normal, cybercriminals will continue refining their strategies. A more fractured remote workforce is harder to secure, especially for firms that have made the shift quickly and raced to get their employees up and running.

However, by tracking the methods used by cybercriminals, organisations can concentrate their efforts on securing the key areas that will most effectively mitigate risks. Closely monitoring network traffic and user behaviour in real time will provide an edge in identifying attacks before they can escalate.

Matt Lock, Technical Director UK, Varonis

With 20 years’ cyber security experience, Matt’s an expert on data security and an accomplished CISSP Security Consultant, he’s worked with world-leading organisations across insurance, pharmaceuticals, legal, health, entertainment, retail and utilities. As Technical Director at Varonis, he heads up the team which undertakes risk assessments and data governance projects, helping organisations to secure and manage their unstructured data. 

Read more
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Hack The Box crisis simulation event
“Everyone will experience a hack” - how incident response can protect your organization
An illustration of a silhouetted thief in motion running while carrying a stolen fingerprint
The 5 worst cyberattacks of 2024
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Don’t let holidays be your cybersecurity downfall
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
Latest in Security
An American flag flying outside the US Capitol building against a blue sky
Sean Plankey selected as CISA director by President Trump
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
Nation-state threats are targeting UK AI research
Scam alert
Fake jobs and phone calls: How Americans lost $12.5 bn to fraud in 2024
Application Security Testing Concept with Digital Magnifying Glass Scanning Applications to Detect Vulnerabilities - AST - Process of Making Apps Resistant to Security Threats - 3D Illustration
Google bug bounty payments hit nearly $12 million in 2024
Scam alert
A new SMS energy scam is using Elon Musk’s face to steal your money
Representational image of a cybercriminal
Allstate sued for exposing personal customer information in plaintext
Latest in Features
Sigma BF silver camera in the hand at The Photography Show, UK
I tried the Sigma BF camera everyone is talking about – it's truly stunning, but has one fundamental flaw
Pia holding a camera and smiling at something off camera in Picture This.
Picture This is Prime Video's #1 movie, but it hasn't captured everyone – here are 3 more rom-coms to watch instead with over 85% on Rotten Tomatoes
The Deepal EO7 from the side, an SUV and pick-up truck combo
I drove an electric SUV that transforms into a pick-up, and it’s as fun as it is functional
TensorPix
What is TensorPix: Everything we know about this AI video and image enhancing tool
Robert Pattinson in a space suit in Mickey 17
3 Bong Joon-ho movies to stream after you've watched Mickey 17, including 2020's Best Picture winner
Willem Dafoe in Mississippi Burning
5 great free movies to stream on Tubi, Pluto TV, Plex and more this week (March 10)