Magecart Strikes Again
Ticketmaster, British Airways, and Newegg have all been compromised. Who’s next? Read our research to see how we discovered the breaches.
IDG Connect: 2017 State of Enterprise Digital Defense Report
Findings quantify the security management gap and business impact of external web, social, and mobile threats.
Get the Research Report
Frost & Sullivan: The Digital Threat Management Platform Advantage
The material benefits of a platform-based approach to security outside the firewall.
Read the Report
2018 Holiday Shopping Season Threat Activity: A Snapshot
The 2018 holiday shopping season was the largest ever for online retailers, but threat actors filled their pockets, too.
So what did the threat activity around this shopping frenzy look like?
Rackspace Accelerates External Digital Threat Investigation with RiskIQ PassiveTotal
Download Case Study
EMA Radar™ Q4 2017 Report
RiskIQ ranked a technology and value leader in digital threat intelligence management.
Get the Analyst Report
For businesses with an online presence, it’s not a question of if threat actors are targeting you, it’s a question of when, how, and how often. In 2018, there were 53,308 reported security incidents and 2,216 data breaches across 65 countries. Ironically, many of the victims thought they were doing everything necessary to protect their customers and business.
Among the victims of these incidents were high-profile companies like Equifax, Marriot, and British Airways. Each of them maintains sensitive consumer data, so it’s a reasonable assumption that their cybersecurity practices were sophisticated and their attack surfaces impenetrable. So no matter how often data breaches come to light, it’s still shocking when these mega-breaches hit the front page. After all, how can an organization we trust with our most sensitive personal data be compromised, and in the case of Equifax, for so long and so damn easily?
The unfortunate answer lies in the way most organizations approach security. It too often involves a checklist only of simple, traditional measures focusing on maintaining a perimeter and hiding behind it. They monitor internal networks while ignoring a crucial portion of their attack surface: everything that lives outside the firewall, a varied collection of client-facing assets that hackers can and will discover as they research their next threat campaigns.
Until recently, this was deemed enough. Not anymore.
Investing in security inside the firewall while ignoring anything client-facing is like purchasing a bike helmet and expecting it to protect your entire body. Today, a business’s attack surface extends from the internal network all the way to the farthest reaches of the internet. Traditional security approaches have little or no visibility and attackers have plenty. Security teams are now responsible for defending this enormous swath of digital real estate with the same scrutiny as their internal networks. Nevertheless, many do not.
Adding to the disbelief of CISOs, consumers, and the press, organizations validate their outdated approach when these breaches happen by pointing to a satisfactory security score or risk report from vendors. These scores use narrow criteria and only attempt to predict the likelihood of a breach based on a point-in-time reference, often doing more to mask severe flaws and shortcomings rather than actually prevent them.
But an organization’s attack surface and the threat landscape that targets it is changing all the time: certificates expire, frameworks need patching, shadow IT is stood up, and attackers’ tactics evolve. Recent RiskIQ data shows millions of websites are still running versions of PHP that will expire this month, making them vulnerable to yet another wave of breaches. Because of these constant changes, a static scorecard is useful, but it’s hardly the authority on assessing a security posture. If anything, it may actually cause you to become reliant on a false sense of security.
When organizations manage their entire attack surface, they understand what they look like from the outside-in. This means they can develop a strategy that lets them discover everything associated with their organization on the internet, both legitimate and malicious, and shrink its attack surface down to size. However, bringing the massive scope of an organization’s attack surface into focus is no easy task. Ask any corporate security leader how many of their company’s digital assets exist outside their firewall. Their approximation is likely just a fraction of the real number.
A recent rash of supply chain attacks has been capitalizing on this lack of visibility into corporate attack surfaces. These attacks breach vulnerable third-party components to gain access to thousands of sites at once, and they are a central narrative to some of the year’s most high-profile security events. Just consider the rise of Magecart, the threat group responsible for intercepting millions of consumer credit card records.’
Discovering these vulnerable assets takes considerable resources. Organizations finding success on today’s threat landscape are those spending on surveillance and reconnaissance tools that show them what they look like from the outside-in. The tools providing insight and visibility into these assets leverage internet data to discover everything associated with an organization on the web, monitoring them for compromise and bringing the massive scope of an attack surface into focus. With this view, organizations can take a proactive approach to defend their organizations. They can even be proactive against future attacks online.
It won’t be long until high-profile breaches are no longer tolerated. Consumers and regulatory bodies will punish businesses that put their data at risk. Those who fall short in managing their entire attack surface (not just internal networks) will suffer crushing material loss. Today we’re in a new age of security—the age of Attack Surface Management. Taking a proactive approach by venturing beyond the corporate perimeter to identify forgotten, mismanaged or vulnerable assets is now the only way to protect your business, your customers, and your employees.
If you have a “c” in your title, you're a target both online and in the physical world. Here are 5 things to "know" about modern executive defense https://t.co/Nl3lrvEM7O
#PlayStore winning war on suspect apps https://t.co/Zw1yuLswXF
Blacklisted apps rise, antivirus apps prove more harm than good, and Google Play continues to set the trends. Download our Q1 Mobile Threat Landscape Report and 2018 review for a deep dive into the last 18 months of #MobileThreats: https://t.co/FipDUCA6wA
Check out my latest interview in Forensic Magazine: Cybercrime, Cybertargets, and Cybersecurity https://t.co/TNy7MhoUn2 @LauraMFrench @ForensicMag @RiskIQ #cybercrime #CyberSecurity #threathunting
If you're at #GartnerSEC be sure to stop by booth #623 to chat with RiskIQ about attack surface management and defending your organization in the age of threats outside the firewall!