Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

10/9/2020
10:00 AM
John Hammond
John Hammond
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Why MSPs Are Hacker Targets, and What To Do About It

Managed service providers are increasingly becoming the launching pad of choice for ransomware and other online malfeasance.

It's commonly understood that smaller businesses have smaller IT budgets, which often does not leave much room for IT security. Even in 2020, many of these companies have never heard of NIST, ISO 27001, or other security frameworks, let alone implemented them. And with more than 30 million businesses falling in the category of fewer than 1,000 employees, small businesses represent a significant part of the American economy. For an attacker, this is a gold mine of potential opportunity, but the key to that financial reward means operational scalability, putting the target squarely on managed service providers (MSPs). 

Why MSPs?
Many small to midsize businesses (SMBs) rely on MSPs to assist them with cost-effective management of IT infrastructure, monitoring, and general support. Companies regularly put their trust in MSPs to protect their data, but we have to remember that MSPs are often small businesses themselves. And as attack vectors increase by the minute, there seems to be no end in sight to the growing pressures on MSPs

Related Content:

Eight Flaws in MSP Software Highlight Potential Ransomware Vector

State of Endpoint Security: How Enterprises Are Managing Endpoint Security Threats

New on The Edge: CFAA 101: A Computer Fraud & Abuse Act Primer for InfoSec Pros

So, why are MSPs a major target for cyberattacks? The obvious answer is that an MSP may service a myriad of SMBs; having access to one MSP is an easy gateway to all of their supported SMB networks. Not to mention that nearly two-thirds of organizations use MSPs for at least one IT function.  

Unfortunately, MSPs are now being used more and more as a pawn for hackers' malicious plans. Recently, Ragnar Locker ransomware hit Portuguese energy giant EDP, demanding a $10.9 million ransom. The operators behind the ransomware strain are known to furtively target software used by MSPs to avoid being detected. My company reported earlier this year that it detected Ragnar Locker being deployed via common MSP remote management and monitoring tools. As attacks like these proliferate, MSPs must remain vigilant with their security practices.

The MSP Security Challenge
Cyber defense doesn't come for free, and this is a significant challenge for MSPs. There are really only two places where an MSP can look to increase security standards for their end customers: The first is convincing the SMB to spend more on security, which is often a difficult upsell given already tight IT budgets. The second is to eat into their thin margins while still maintaining the ability to update defenses as needed by the threat landscape. 

The vast majority of cybersecurity defense solutions are purpose-built for the enterprise, bringing in a plethora of technology bells and whistles often too overwhelming or unnecessary for the SMB. All too often, there's chatter around cybersecurity proselytizing the merits of artificial intelligence, machine learning, and behavioral analytics — all of which come with high costs. The truth is, MSPs need solutions that cater to their specific needs, not just from a technical point of view but also financial and operational perspectives in order to get to the coveted 80/20

Small businesses have gained operational agility with the rise of the cloud and software-as-a-service, and with that, attackers have evolved to go after the lowest-hanging fruit. In order to quickly combat these constantly changing threats, small businesses — which make up 99% of corporations — need cybersecurity solutions specifically streamlined to easily fit within their financial business models. 

Some Advice for MSPs
With the current landscape and a predominantly remote workforce, malicious actors are even more prone to taking advantage of MSPs. So, what can MSPs do now to ensure the businesses they serve are receiving the same, if not better, service during this time? 

  • Get to know your customers and understand what matters to them. If you support accounting firms, understand the vulnerabilities and heightened exposure around tax season and show how you are focusing security efforts around key assets and priorities. 
  • Find ways to push customers into adopting key high-impact security services such as multifactor authentication (MFA) and suppress the latest and greatest cybersecurity buzzwords. 
  • Invest time in the tools you already have. Evaluating and deploying a new tool takes a lot of time and effort, which often comes with license fees and vendor management headaches. There are tons of tools right at your fingertips to help secure your customers built into your remote management tools — tools such built-in inventory, audit reports, or even Windows Security Baselines.
  • Know your response plan. Whether it's your customer that suffers a breach or even the chance that your own MSP business is targeted, it's important to have a plan in place in order to react quickly. Designate people who will be responsible for handling communications, assign the right technical team to handle incident investigation, and pull together your triage process. Doing this upfront will save you precious minutes in the event an incident occurs.

Above all, constant communication, monitoring, and staying on top of the latest threats will prove valuable and establish new protocols to be referenced in the future. The 99% of small businesses may have 99 problems, but hopefully with the right solutions and a base level of due diligence, their MSP won't be one.

John Hammond is a Security Researcher at Huntress as well as a cybersecurity instructor, developer, red teamer, and CTF enthusiast. John is a former Department of Defense Cyber Training Academy curriculum developer and teacher for the Cyber Threat Emulation course, educating ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25660
PUBLISHED: 2020-11-23
A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph...
CVE-2020-25688
PUBLISHED: 2020-11-23
A flaw was found in rhacm versions before 2.0.5 and before 2.1.0. Two internal service APIs were incorrectly provisioned using a test certificate from the source repository. This would result in all installations using the same certificates. If an attacker could observe network traffic internal to a...
CVE-2020-25696
PUBLISHED: 2020-11-23
A flaw was found in the psql interactive terminal of PostgreSQL in versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If an interactive psql session uses \gset when querying a compromised server, the attacker can execute arbitrary code as the operating sy...
CVE-2020-26229
PUBLISHED: 2020-11-23
TYPO3 is an open source PHP based web content management system. In TYPO3 from version 10.4.0, and before version 10.4.10, RSS widgets are susceptible to XML external entity processing. This vulnerability is reasonable, but is theoretical - it was not possible to actually reproduce the vulnerability...
CVE-2020-28984
PUBLISHED: 2020-11-23
prive/formulaires/configurer_preferences.php in SPIP before 3.2.8 does not properly validate the couleur, display, display_navigation, display_outils, imessage, and spip_ecran parameters.