Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

4/14/2020
04:55 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Insecure Home Office Networks Heighten Work-at-Home Risks

Nearly one in two organizations has one or more devices accessing its corporate network from a home network with at least one malware infection, BitSight says.

There's broad recognition that work-from-home mandates in response to the COVID-19 crisis have sharply elevated cyber-risks for enterprise organizations. Now BitSight has attempted to quantify some of those risks in a new study based on data from a sample of 41,000 US organizations.

The security vendor examined residential IP addresses that were associated with corporate networks to see if it could identify attributes that posed unique cyber-risks to corporations. As part of its research, BitSight compared the overall health of devices attached to work-from-home–remote offices (WFH-RO) IPs with those of devices on typical office networks.

The research showed that home networks were 3.5 times more likely than corporate networks to have at least one malware family — and 7.5 times more likely to have five or more distinct types of malware. BitSight found some malicious software — such as Mirai, which was used to launch massive distributed denial-of-service attacks in 2016 — 20 times more frequently on home networks than on enterprise networks.

BitSight's study also found that 25% of devices on home networks — such as PCs, network-attached printers, smart home products — had one or more services exposed on the Internet. Nearly one in two organizations (45%) had one or more devices accessing its corporate network from a home network with at least one malware infection.

"The WFH-RO network has a significantly higher population of malware corresponding to corporate networks, as well as poorer network perimeter practices," says Dan Dahlberg, director of security research at BitSight. "These local home networks pose a greater threat to devices accessing corporate information, particularly if they have not been hardened and re-enforced with endpoint protection technologies."

The COVID-19 pandemic has triggered a big increase in the number of people working from home around the globe. In many instances, companies that have not previously supported teleworking capabilities have been forced to implement them hurriedly in order to keep their businesses running while work-at-home mandates remain in effect. Even organizations that have traditionally supported remote workers, in many instances, have been left scrambling to accommodate the sudden increase in the number of teleworkers over the past few weeks.

Security analysts have expressed concern about the situation exposing organizations to more attacks from opportunistic adversaries. In recent weeks, several security vendors have noted a sharp increase in COVID-19 related phishing, spam, business email compromise and other scams.

BitSight's research is one of the first to evaluate the security of the work-from-home networks that individuals are using to access the corporate network.

"We did hypothesize that residential networks would tend to perform poorly in comparison to corporate networks in both malware proliferation and network perimeter security," Dahlberg says. But what was surprising was the relatively high prevalence of certain malware families — such as Mirai and Trickbot — on home networks. Also surprising was the also sheer number of IP addresses with exposed administrative interfaces, he says.

For organizations, the health of the home network and the devices connected to it are important, he says. A corporate device that resides on the same local network as another with malware on it is vulnerable to compromise, he says. "Even for devices using a VPN, the device is still exposed to the activities of other devices on the local network," Dahlberg notes.

Organizations should consider the security of the networks that their devices operate in and work to improve the posture of the endpoint systems. They also need to educate their personnel on the best practices for securing their home environment against phishing and malware spam attacks, Dahlberg says. A zero-trust security model — where all devices are users are vetted and authenticated each time they request access to a corporate asset — can help alleviate some of the issues created by workers logging in from insecure home networks, he says.

Related News:

A listing of free products and services compiled for Dark Reading by Omdia analysts to help meet the challenges of COVID-19. 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
mypayday
50%
50%
mypayday,
User Rank: Apprentice
4/15/2020 | 10:18:40 AM
We need to educate ourselves
Very interesting article. I agree that companies should educate their personnel on the best practices for securing their home. The security risk is high not only for users but also companies such as banks and companies that provide personal loans online among others are more vulnerable to these types of attacks.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/3/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4035
PUBLISHED: 2020-06-03
In WatermelonDB (NPM package "@nozbe/watermelondb") before versions 0.15.1 and 0.16.2, a maliciously crafted record ID can exploit a SQL Injection vulnerability in iOS adapter implementation and cause the app to delete all or selected records from the database, generally causing the app to...
CVE-2020-13783
PUBLISHED: 2020-06-03
D-Link DIR-865L Ax 1.20B01 Beta devices have Cleartext Storage of Sensitive Information.
CVE-2020-13784
PUBLISHED: 2020-06-03
D-Link DIR-865L Ax 1.20B01 Beta devices have a predictable seed in a Pseudo-Random Number Generator.
CVE-2020-13785
PUBLISHED: 2020-06-03
D-Link DIR-865L Ax 1.20B01 Beta devices have Inadequate Encryption Strength.
CVE-2020-13786
PUBLISHED: 2020-06-03
D-Link DIR-865L Ax 1.20B01 Beta devices allow CSRF.