CIO Influence
Challenges Guest Authors Security

Shining a Spotlight on User Identity and Device Trust in Cybersecurity

Shining a Spotlight on User Identity and Device Trust in Cybersecurity

Research shows that a staggering 94.6% of all breaches are driven by financial motives, and hackers view financial services organizations as gold mines of sensitive data. Based on cybersecurity incidents in this sector, personal data continues to be the most desired type of data stolen in the industry.

PREDICTIONS SERIES 2024 - CIO InfluenceWhile the rising volume of cyberattacks in financial services and across other industries could be due to increasingly sophisticated cybercriminals, this is largely a misconception. The truth is that hackers are using many of the same tactics theyโ€™ve been successfully employing for the last decade, the majority of which are aimed at exploiting user identities or compromising endpoint devices (PCs, laptops, phones, etc.). However, todayโ€™s cybercriminals have the advantage of a range of toolkits that open up hacking to โ€œentry-levelโ€ threat actors with minimal technical skills. Bad actors also have access to generative AI and can leverage reams of open-source data about target companies, employees, and customers to create very believable phishing messages for email, SMS, and social platforms โ€“ all without the telltale grammar and spelling errors that used to help us recognize (most of) these scam messages in the past.

Benefits of AI Authentication in Preventing Digital Threats

Common attack methods

Hackers continue to use social engineering techniques that rely more on manipulating human psychology than on technical know-how. Between these โ€œmind gameโ€ tactics and readily available tools, todayโ€™s financially motivated hackers donโ€™t need to be technical geniuses to be effective. They can also buy access to corporate networks and user accounts from initial access brokers who specialize in that function. Thus, adversaries donโ€™t have to โ€œbreak inโ€; they can simply reuse credentials they bought or phished to log in and launch ransomware attacks, steal data, or access user accounts.

Despite efforts to educate users and reduce the number of scam emails that make it to inboxes, phishing continues to be a very effective tactic. The basic premise hasnโ€™t changed โ€“ the adversary sends an alarming message via email, SMS, or even social media that is designed to prompt receivers to click on a malicious link. These links can be leveraged for all kinds of purposes, from credential theft to installing malware on the endpoint device.

On the identity front, CrowdStrikeโ€™s 2023 Threat Hunting Report shows that 80% of breaches use compromised identities, and Verizonโ€™s 2023 Data Breach Investigations Report indicates that stolen user credentials are the single most popular entry point for breaches.

Phishing and ransomware are the next most frequent ways attackers access organizations. On the device front, Verizon’s report lists user devices as one of the top three assets affected and manipulated in breaches.

Evolving Authentication

Unfortunately, the original multi-factor authentication (MFA) designed to thwart credential-reuse attacks is becoming trivial for adversaries to bypass. This so-called legacy MFA was only effective for a while since adversaries have become adept at stealing passwords, along with MFA codes, or hijacking tokens that applications use to keep the user session open for some time. With the token or a password and MFA code combination, attackers continue to simply log in as valid users.

Further, traditional MFA was only designed to improve our ability to validate a userโ€™s identity โ€“ it did not do anything to check that the endpoint device gaining access was secure. Therefore, the solution to the single largest attack method is modern โ€œphishing-resistantโ€ MFA that also checks whether the device is trustworthy. Strong MFA uses a combination of biometrics and cryptographic passkeys (defined in a standard from the Fast IDentity Online, or FIDO organization).

Cyber Attackers Take a Swipe at McLaren Health Careโ€™s Database

Modern MFA uses strong, phish-resistant factors and is architected to thwart attacker-in-the-middle tactics to steal session tokens. Modern MFA must also include the ability to check whether the device is secure before granting access. The version the U.S. Department of Homeland Security deems โ€œoptimalโ€ can continuously validate the user identity and device trust.

Since the financial services industry is especially vulnerable to system breaches and data loss, organizations within this sector need to be extra vigilant about validating user identity and device trust. With modern MFA, security leaders can radically reduce their organizationsโ€™ vulnerability to cyberattacks, shut the proverbial front door, and focus their resources.

Organizations Rush to Use Generative AI Tools Despite Significant Security Concerns

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Cybersecurity Powerhouse Edna Conway Joins The Cybersecurity Studio as Advisor

PR Newswire

The Neural Policy Engine: How CIOs Turn AI Ethics Into Code

Recorded Future Announces Second Investment in Cyber Threat Cognitive Intelligence (CTCI)