Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

02:00 PM
Liviu Arsene
Liviu Arsene
Connect Directly
E-Mail vvv

To Err Is Human: Misconfigurations & Employee Neglect Are a Fact of Life

The cyber kill chain is only as strong as its weakest link, so organizations should reinforce that link with a properly equipped dedicated security team.

Endpoint misconfigurations are responsible for a third of all security incidents, and poor remote management policies account for hundreds of thousands of vulnerable systems, according to Bitdefender telemetry. Making the situation worse, 93% of employees recycle old passwords, invalidating the work of security departments.

While pop culture and Hollywood productions depict hackers working tirelessly to compromise security systems and break down firewalls, only a handful of attacks require this level of intense work. In reality, the hackers' work is much simpler. Employees and misconfigured systems do most of the heavy lifting for these threat actors, creating vulnerable points of attack in any organization. The cyber kill chain is only as strong as its weakest link — which is often its people.

Misconfigurations and Human Risks Drive the Need for Security
Despite the myriad security precautions an organization has taken to stave off intrusions, it's a challenge to account for the human element. However, human error is not solely someone opening an attachment containing malware or an employee falling for a phishing scheme. Instead, it includes everything that had to go wrong for that message to reach the employee, for the malware to be able to take hold, or for the security event to go unnoticed.

Related Content:

'It Won't Happen to Me': Employee Apathy Prevails Despite Greater Cybersecurity Awareness

State of Endpoint Security: How Enterprises Are Managing Endpoint Security Threats

New on The Edge: CFAA 101: A Computer Fraud & Abuse Act Primer for InfoSec Pros

The human risk element starts with misconfigurations of companywide security policies. There's nothing that hackers love more than IT errors caused by policy misconfiguration in software, such as patching, access control, and even services like Windows Remote Management (WinRM).

Analysis of Bitdefender telemetry shows that WinRM topped that list of misconfigurations in the first half of 2020, with 55.5% of all scanned endpoints. Attackers seek out WinRM vulnerabilities and misconfigured policies because they enable full remote control, allowing them to execute malicious code, change registry keys, grant PowerShell access, or simply remotely dial into machines.

And while WinRM is not an attack vector in and of itself, it can have a devastating impact if misconfigured. Policies such as "allow unencrypted traffic" or "allow basic authentication" should be disabled because attackers might use them to discover hosts running WinRM and brute-force access. Compromising a trusted account or system allows an attacker to access the device shell, plant ransomware, and move laterally across the organization.

Of course, WinRM is a necessary tool and simply disabling it entirely is not a feasible solution. Neither is limiting access to users to minimize the attack surface. Security is always a compromise between functionality and protection, with organizations choosing to provide its employees the right policies for the right job.

As we examine misconfiguration issues further, a recent ESG and Bitdefender report shows that endpoint misconfiguration accounts for 27% of entry points exploited by attackers. Exacerbating the problem, bad policies related to accounts, password storage, and password management are the most common endpoint misconfigurations caused by individuals.

Internet settings are another important and often-overlooked category of security policy, accounting for 73.1% of all endpoint misconfigurations. For example, users should not be able to run unsigned .NET framework components from Internet Explorer, but this happens frequently. Another problem arises with SSL 3.0 downgrade attacks, allowing attackers to perform man-in-the-middle attacks on what should otherwise be encrypted communication.

The Ignored Power of Companywide Policies
Setting up policies inside an organization should always be a priority, which sometimes can take precedence. So many problems stem from a gap in security policies, it's difficult to count them all. One thing is certain: Most security issues could be easily fixed by tailoring the users' access, tools, and operating systems so that they can't overstep their bounds.

Additionally, employees can increase organizational risk by skirting security policies in favor of more vulnerable procedures that feel faster. Policies to prevent employee interference in security procedures need to be enforced by IT and supported by senior leadership.

Also, one of the mistakes security teams often make is to enforce much too draconic policies and companywide measures, making the day-to-day operations difficult for employees. While it might sound counterintuitive, there is such a thing as too much security.

Password reuse is identified as one of the most common bad security practices, reigning supreme as the highest human risk in a company, with a whopping 93.1% of employees recycling old credentials. Reusing the same password over multiple services, including work, gives bad actors an easy "in."

According to Verizon's "2020 Data Breach Investigations Report," over 80% of breaches due to hacking involve brute-force attacks or lost or stolen credentials. And that takes us full circle to policies enforcement, which is especially necessary when it comes to users' passwords.

When It's Too Much for IT to Handle Security
With all of the possible misconfiguration looming on the horizon, companies have different choices, depending on their size and risk profile. In some situations, the IT department can have enough resources to deal with setting up policies and security. When they can no longer cover those tasks adequately, it's the organization's prerogative to expand those resources, either internally by building a security operations center or by using a third-party team.

As studies and the never-ending news of data breaches affecting millions show, misconfigurations and vulnerabilities are a fact of life, and organizations are rarely equipped to identify them and remediate. As the cyber kill chain is as strong as its weakest link, organizations should reinforce that link with a dedicated security team equipped to reduce the attack surface and take care of most of the issues that keep the CISO up at night, implementing the right policies, and filling the security gaps that are inevitable in any company.

Liviu Arsene is a Global Cybersecurity Researcher for Bitdefender, with a strong background in security and technology. Researching global trends and developments in cybersecurity, he focuses on advanced persistent threats and security incidents while assessing their impact ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-14
A buffer overflow vulnerability in SonicOS allows a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted request. This vulnerability affects SonicOS Gen5, Gen6, Gen7 platforms, and SonicOSv virtual firewalls.
PUBLISHED: 2021-06-14
magento-scripts contains scripts and configuration used by Create Magento App, a zero-configuration tool-chain which allows one to deploy Magento 2. In versions 1.5.1 and 1.5.2, after changing the function from synchronous to asynchronous there wasn't implemented handler in the start, stop, exec, an...
PUBLISHED: 2021-06-14
net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
PUBLISHED: 2021-06-14
Cross-site Scripting (XSS) vulnerability in the main dashboard of Ellipse APM versions allows an authenticated user or integrated application to inject malicious data into the application that can then be executed in a victim’s browser. This issue affects: Hitachi ABB Power Grids ...
PUBLISHED: 2021-06-14
Improper Input Validation vulnerability in Hitachi ABB Power Grids Relion 670 Series, Relion 670/650 Series, Relion 670/650/SAM600-IO, Relion 650, REB500, RTU500 Series, FOX615 (TEGO1), MSM, GMS600, PWC600 allows an attacker with access to the IEC 61850 network with knowledge of how to reproduce the...