Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
Why MSPs Are Hacker Targets, and What To Do About It
Managed service providers are increasingly becoming the launching pad of choice for ransomware and other online malfeasance.
October 9, 2020
5 Min Read
It's commonly understood that smaller businesses have smaller IT budgets, which often does not leave much room for IT security. Even in 2020, many of these companies have never heard of NIST, ISO 27001, or other security frameworks, let alone implemented them. And with more than 30 million businesses falling in the category of fewer than 1,000 employees, small businesses represent a significant part of the American economy. For an attacker, this is a gold mine of potential opportunity, but the key to that financial reward means operational scalability, putting the target squarely on managed service providers (MSPs).
Many small to midsize businesses (SMBs) rely on MSPs to assist them with cost-effective management of IT infrastructure, monitoring, and general support. Companies regularly put their trust in MSPs to protect their data, but we have to remember that MSPs are often small businesses themselves. And as attack vectors increase by the minute, there seems to be no end in sight to the growing pressures on MSPs.
So, why are MSPs a major target for cyberattacks? The obvious answer is that an MSP may service a myriad of SMBs; having access to one MSP is an easy gateway to all of their supported SMB networks. Not to mention that nearly two-thirds of organizations use MSPs for at least one IT function.
Unfortunately, MSPs are now being used more and more as a pawn for hackers' malicious plans. Recently, Ragnar Locker ransomware hit Portuguese energy giant EDP, demanding a $10.9 million ransom. The operators behind the ransomware strain are known to furtively target software used by MSPs to avoid being detected. My company reported earlier this year that it detected Ragnar Locker being deployed via common MSP remote management and monitoring tools. As attacks like these proliferate, MSPs must remain vigilant with their security practices.
The MSP Security Challenge
Cyber defense doesn't come for free, and this is a significant challenge for MSPs. There are really only two places where an MSP can look to increase security standards for their end customers: The first is convincing the SMB to spend more on security, which is often a difficult upsell given already tight IT budgets. The second is to eat into their thin margins while still maintaining the ability to update defenses as needed by the threat landscape.
The vast majority of cybersecurity defense solutions are purpose-built for the enterprise, bringing in a plethora of technology bells and whistles often too overwhelming or unnecessary for the SMB. All too often, there's chatter around cybersecurity proselytizing the merits of artificial intelligence, machine learning, and behavioral analytics — all of which come with high costs. The truth is, MSPs need solutions that cater to their specific needs, not just from a technical point of view but also financial and operational perspectives in order to get to the coveted 80/20.
Small businesses have gained operational agility with the rise of the cloud and software-as-a-service, and with that, attackers have evolved to go after the lowest-hanging fruit. In order to quickly combat these constantly changing threats, small businesses — which make up 99% of corporations — need cybersecurity solutions specifically streamlined to easily fit within their financial business models.
Some Advice for MSPs
With the current landscape and a predominantly remote workforce, malicious actors are even more prone to taking advantage of MSPs. So, what can MSPs do now to ensure the businesses they serve are receiving the same, if not better, service during this time?
Get to know your customers and understand what matters to them. If you support accounting firms, understand the vulnerabilities and heightened exposure around tax season and show how you are focusing security efforts around key assets and priorities.
Find ways to push customers into adopting key high-impact security services such as multifactor authentication (MFA) and suppress the latest and greatest cybersecurity buzzwords.
Invest time in the tools you already have. Evaluating and deploying a new tool takes a lot of time and effort, which often comes with license fees and vendor management headaches. There are tons of tools right at your fingertips to help secure your customers built into your remote management tools — tools such built-in inventory, audit reports, or even Windows Security Baselines.
Know your response plan. Whether it's your customer that suffers a breach or even the chance that your own MSP business is targeted, it's important to have a plan in place in order to react quickly. Designate people who will be responsible for handling communications, assign the right technical team to handle incident investigation, and pull together your triage process. Doing this upfront will save you precious minutes in the event an incident occurs.
Above all, constant communication, monitoring, and staying on top of the latest threats will prove valuable and establish new protocols to be referenced in the future. The 99% of small businesses may have 99 problems, but hopefully with the right solutions and a base level of due diligence, their MSP won't be one.
About the Author(s)
Senior Security Researcher, Huntress
John Hammond is a Security Researcher at Huntress as well as a cybersecurity instructor, developer, red teamer, and CTF enthusiast. John is a former Department of Defense Cyber Training Academy curriculum developer and teacher for the Cyber Threat Emulation course, educating both civilian and military members on offensive Python, PowerShell, other scripting languages and the adversarial mindset. He personally developed training material and infosec challenges for events such as PicoCTF and the "Capture the Packet" competition at DEFCON US. John speaks at security conferences such as BsidesNoVA, to students at colleges such as the University of North Carolina Greensboro, and other events like the SANS Holiday Hack Challenge/KringleCon. He is an online YouTube personality showcasing programming tutorials, cyber security guides, and CTF video walkthroughs. John currently holds the following certifications: Security+, eJPT, eCPPT, CEH, PCAP, OSWP, OSCP, OSCE, and OSWE.
You May Also Like
Your Everywhere Security guide: Four steps to stop cyberattacksFeb 27, 2024
Your Everywhere Security Guide: 4 Steps to Stop CyberattacksFeb 27, 2024
API Security: Protecting Your Application's Attack SurfaceFeb 29, 2024
API Security: Protecting Your Application's Attack SurfaceFeb 29, 2024
Securing the Software Development Life Cycle from Start to FinishMar 06, 2024
Laptop with ransomware, and bitcoin in the palm of a man's hand to illustrate ransomwareCyberattacks & Data Breaches