Security

Make these 5 changes to avoid becoming the next cybersecurity headline

What we can learn from the MGM Resorts breach

Comment

Concept piece for topics such as Technology Security, Data protection, Data Theft, hacking, ethical hackers, digital warfare, corporate intellectual property theft, ransomware and cyber attacks.
Image Credits: Craig Hastings (opens in a new window) / Getty Images

Jim Broome

Contributor

Jim Broome, a seasoned IT/IS veteran with more than 20 years of information security experience in both consultative and operational roles, leads DirectDefense, where he is responsible for the day-to-day management of the company.

It’s not a matter of if but when an organization will face a cybersecurity incident. Incidents like what happened to MGM Resorts after the ransomware groups ALPHV/BlackCat and Scattered Spider brought systems down for days, causing severe strains on revenue due to disrupted productivity, lost business during downtime, attorney fees, and remediation costs.

While insufficient information has been disclosed to understand the full extent of the MGM Resorts breach, in recent years we have directly witnessed a significant shift in the tactics employed by highly coordinated threat actor groups, such as ALPHV/BlackCat. These groups are increasingly prioritizing targeting infrastructure over endpoints during our incident response engagements.

What can organizations do to prevent becoming the next headline? Here are five areas to watch out for.

Enhance help desk procedures to include video chats and photo IDs to verify the authenticity of requests

The 2023 Data Breach Investigations Report by Verizon unveiled that in 74% of the reported breaches, a human factor played a role, whether partially or entirely, in causing the breach. The term “human element” encompasses various situations, ultimately pointing to human involvement in creating a vulnerability, whether it’s deliberate or accidental.

In this particular instance, the threat actor reported that they monitored LinkedIn profiles to identify potential targets and then infiltrated the organization by vishing or “voice phishing” the IT help desk. They have been known to employ social engineering tactics targeting individuals with answers to validation questions commonly used by the help desk.

Relying solely on text or email, or even voice calls, is no longer sufficient. ALPHV/BlackCat and other threat actor groups have even resorted to employing voice impersonators, making it challenging to discern their true identity based on accent or voice characteristics.

Organizations should update help desk procedures to include measures like video chats and photo identification for verifying the identity of individuals seeking assistance.

Choose multifactor authentication features wisely

Multifactor authentication should be enabled whenever possible, but be sure that your organization is choosing its policies and procedures wisely.

In particular, ALPHV has been known to leverage SIM-swapping techniques by investing as much as $1,500 to $2,500 per targeted employee to swap their phone number to a device they could control. SIM swapping occurs when the device tied to a customer’s phone number is fraudulently manipulated. With this technique, a bad actor can successfully authenticate as the employee if the organization still allows text messaging for multifactor authentication.

Of the organizations that have suffered from this successful exploitation, the one commonality is that a majority of the victims are T-Mobile subscribers. While all carriers have issues preventing these types of account thefts, T-Mobile has experienced numerous data breaches, providing threat actors with ample information to impersonate legitimate customers in brick-and-mortar stores and facilitate SIM-swap attacks.

Limit access privileges of help desk personnel

General help desk personnel should not possess access to modify or reset privileged access accounts within the organization. Highly privileged accounts should only be modifiable by a limited number of people in your organization. Work from home did not do us any favors with operational procedures; however, help desk procedures specifically warrant attention and rectification to update controls around the handling of privileged accounts.

Additionally, cybersecurity awareness training for all employees plays a vital role in preventing cyberattacks. Human error is often a significant factor in successful attacks, so educating employees about their roles and responsibilities in maintaining security is critical. Regular training sessions can help raise awareness about the latest threats, teach best practices for safe computing, and foster a security-conscious culture within the organization.

Implement network segmentation

Based on the currently available information about the MGM Resorts breach, it appears the threat actors successfully gained access to multiple network areas that ideally should have been isolated from each other. The critical question here is how or why the threat actors managed to achieve such success in infiltrating networks that were supposed to be segmented.

Additionally, if your corporate backup solution is easily accessible to you, it’s equally accessible to threat actors who can delete the backups during a ransomware attack.

Investing in 24/7 security detection and response capabilities increases an organization’s chances of detecting unusual activity between networks. You can establish a 24/7 security detection and response program either by maintaining an in-house security team or by partnering with a trusted managed security services provider. Continuous monitoring of your organization’s ecosystem allows for timely identification and response to suspicious activities.

Conduct ongoing testing of your environment

One of the key challenges in dealing with state-sponsored cyberattacks is the highly coordinated nature of these threat actors. They possess sophisticated capabilities and can launch attacks on multiple fronts simultaneously. This activity makes it essential for enterprises to have a well-defined and well-practiced security response plan. Conducting regular tabletop exercises can help identify potential gaps in response times and procedures, allowing you to address them proactively before a real attack occurs.

Organizations can also conduct ongoing testing of their environment through a security services vendor. Third-party security services vendors are helping organizations navigate the evolving threat landscape, technology deficits, and environment visibility, as well as staffing a 24/7 in-house security operations center (SOC). Many internal security teams struggle to keep pace with the threat environment. Augmenting teams with 24/7 experts can increase the speed and effectiveness of response.

ISC2, in their annual Cybersecurity Workforce Study, highlighted a significant disparity between the growth of the cybersecurity workforce and the escalating demand for cybersecurity professionals. Despite the addition of more than 464,000 workers in the past year, the workforce gap has expanded at a rate more than twice that of the workforce itself, with a year-over-year increase of 26.2%. This gap underscores the urgent need for more professionals in the field.

For organizations struggling to bridge the skills gap and retain cybersecurity talent, opting for managed security services can be a more practical alternative to traditional hiring.

Regular vulnerability assessments, penetration testing, and security audits help identify potential weaknesses or vulnerabilities that could be exploited by attackers. Remediation of these discovered vulnerabilities should be prioritized and completed routinely.

The landscape of cybersecurity continues to evolve, and organizations must be proactive in their efforts to protect their valuable assets. Recent incidents, such as the breach at MGM Resorts, serve as stark reminders of the potential consequences of inadequate security measures.

More TechCrunch

Maad, a B2B e-commerce startup based in Senegal, has secured $3.2 million debt-equity funding to bolster its growth in the western Africa country and to explore fresh opportunities in the…

Maad raises $3.2M seed amid B2B e-commerce sector turbulence in Africa

The fresh funds were raised from two investors who transferred the capital into a special purpose vehicle, a legal entity associated with the OpenAI Startup Fund.

OpenAI Startup Fund raises additional $5M

Accel has invested in more than 200 startups in the region to date, making it one of the more prolific VCs in this market.

Accel has a fresh $650M to back European early-stage startups

Kyle Vogt, the former founder and CEO of self-driving car company Cruise, has a new VC-backed robotics startup focused on household chores. Vogt announced Monday that the new startup, called…

Cruise founder Kyle Vogt is back with a robot startup

When Keith Rabois announced he was leaving Founders Fund to return to Khosla Ventures in January, it came as a shock to many in the venture capital ecosystem — and…

From Miles Grimshaw to Eva Ho, venture capitalists continue to play musical chairs

On the heels of OpenAI announcing the latest iteration of its GPT large language model, its biggest rival in generative AI in the U.S. announced an expansion of its own.…

Anthropic is expanding to Europe and raising more money

If you’re looking for a Starliner mission recap, you’ll have to wait a little longer, because the mission has officially been delayed.

TechCrunch Space: You rock(et) my world, moms

Apple devoted a full event to iPad last Tuesday, roughly a month out from WWDC. From the invite artwork to the polarizing ad spot, Apple was clear — the event…

Apple iPad Pro M4 vs. iPad Air M2: Reviewing which is right for most

Terri Burns, a former partner at GV, is venturing into a new chapter of her career by launching her own venture firm called Type Capital. 

GV’s youngest partner has launched her own firm

The decision to go monochrome was probably a smart one, considering the candy-colored alternatives that seem to want to dazzle and comfort you.

ChatGPT’s new face is a black hole

Apple and Google announced on Monday that iPhone and Android users will start seeing alerts when it’s possible that an unknown Bluetooth device is being used to track them. The…

Apple and Google agree on standard to alert people when unknown Bluetooth devices may be tracking them

The company is describing the event as “a chance to demo some ChatGPT and GPT-4 updates.”

OpenAI’s ChatGPT announcement: Watch here

A human safety operator will be behind the wheel during this phase of testing, according to the company.

GM’s Cruise ramps up robotaxi testing in Phoenix

OpenAI announced a new flagship generative AI model on Monday that they call GPT-4o — the “o” stands for “omni,” referring to the model’s ability to handle text, speech, and…

OpenAI debuts GPT-4o ‘omni’ model now powering ChatGPT

Featured Article

The women in AI making a difference

As a part of a multi-part series, TechCrunch is highlighting women innovators — from academics to policymakers —in the field of AI.

15 hours ago
The women in AI making a difference

The expansion of Polar Semiconductor’s facility would enable the company to double its U.S. production capacity of sensor and power chips within two years.

White House proposes up to $120M to help fund Polar Semiconductor’s chip facility expansion

In 2021, Google kicked off work on Project Starline, a corporate-focused teleconferencing platform that uses 3D imaging, cameras and a custom-designed screen to let people converse with someone as if…

Google’s 3D video conferencing platform, Project Starline, is coming in 2025 with help from HP

Over the weekend, Instagram announced that it is expanding its creator marketplace to 10 new countries — this marketplace connects brands with creators to foster collaboration. The new regions include…

Instagram expands its creator marketplace to 10 new countries

You can expect plenty of AI, but probably not a lot of hardware.

Google I/O 2024: What to expect

The keynote kicks off at 10 a.m. PT on Tuesday and will offer glimpses into the latest versions of Android, Wear OS and Android TV.

Google I/O 2024: How to watch

Four-year-old Mexican BNPL startup Aplazo facilitates fractionated payments to offline and online merchants even when the buyer doesn’t have a credit card.

Aplazo is using buy now, pay later as a stepping stone to financial ubiquity in Mexico

We received countless submissions to speak at this year’s Disrupt 2024. After carefully sifting through all the applications, we’ve narrowed it down to 19 session finalists. Now we need your…

Vote for your Disrupt 2024 Audience Choice favs

Co-founder and CEO Bowie Cheung, who previously worked at Uber Eats, said the company now has 200 customers.

Healthy growth helps B2B food e-commerce startup Pepper nab $30 million led by ICONIQ Growth

Booking.com has been designated a gatekeeper under the EU’s DMA, meaning the firm will be regulated under the bloc’s market fairness framework.

Booking.com latest to fall under EU market power rules

Featured Article

‘Got that boomer!’: How cybercriminals steal one-time passcodes for SIM swap attacks and raiding bank accounts

Estate is an invite-only website that has helped hundreds of attackers make thousands of phone calls aimed at stealing account passcodes, according to its leaked database.

20 hours ago
‘Got that boomer!’: How cybercriminals steal one-time passcodes for SIM swap attacks and raiding bank accounts

Squarespace is being taken private in an all-cash deal that values the company on an equity basis at $6.6 billion.

Permira is taking Squarespace private in a $6.9 billion deal

AI-powered tools like OpenAI’s Whisper have enabled many apps to make transcription an integral part of their feature set for personal note-taking, and the space has quickly flourished as a…

Buy Me a Coffee’s founder has built an AI-powered voice note app

Airtel, India’s second-largest telco, is partnering with Google Cloud to develop and deliver cloud and GenAI solutions to Indian businesses.

Google partners with Airtel to offer cloud and GenAI products to Indian businesses

To give AI-focused women academics and others their well-deserved — and overdue — time in the spotlight, TechCrunch has been publishing a series of interviews focused on remarkable women who’ve contributed to…

Women in AI: Rep. Dar’shun Kendrick wants to pass more AI legislation

We took the pulse of emerging fund managers about what it’s been like for them during these post-ZERP, venture-capital-winter years.

A reckoning is coming for emerging venture funds, and that, VCs say, is a good thing