Security Navigator 2021 Research-Driven Insights to Build a Safer Digital Society Security Navigator 2021 Foreword
Total Page:16
File Type:pdf, Size:1020Kb
Security Navigator 2021 Research-driven insights to build a safer digital society Security Navigator 2021 Foreword In 2020 our 17 SOCs and 11 CyberSOCs analyzed more than 50 billion security events daily, solved over 45,000 security incidents, and led in excess of 195 incident response missions. Our world-class experts have digested all this unique information and synthesized our key findings in this report, to the benefit of our clients and of the broader cybersecurity community. Hugues Foulon Michel Van Den Berghe Executive Director of Chairman Orange Strategy and Cyber- Cyberdefense France and security activities at Group COO Orange Cyberdefense Orange Cyberdefense We are very pleased to release this edition of the Never has it been more important to get out of a Orange Cyberdefense Security Navigator. Thanks reaction-driven crisis mode back into the driver's to our position as one of the largest telecom seat. We need to protect freedom and safety in the operators in the world as Orange, and as a digital space, not only in crisis, but on our way into European leader in cybersecurity services as the future. Our purpose is to build a safer digital Orange Cyberdefense, we have a unique view society. of the cybersecurity landscape. In the past year our 17 SOCs and 11 CyberSOCs, The COVID-19 pandemic has disrupted the analyzed over 50 billion security events daily, physical and digital society and economy on an solved in excess 45,000 security incidents, and led unprecedented scale. It has fundamentally shifted more than 195 incident response missions to date. the way in which we work and do business. We already see how a lot of these changes take Our world-class experts have digested all this shape as lasting improvements and mind-shifts. unique information and synthesized our key Boosted demands for secure cloud services, findings in this report, to the benefit of our clients reliable remote network connections via SSL and and of the broader cybersecurity community. videoconferencing – the new home office world is here to stay. We are proud and humbled everyday to be trusted with the security of our clients’ most important This crisis also proves that digital freedom is not assets, and are deploying the best expertise and a given. Malicious players increasingly use new technology in all domains to protect their business. and old spaces of connection and progress as opportunities for harm and disruption. Anyone Thanks for your trust! can be a victim on an individual or collective level. Hugues Foulon This can lead to a breach in digital trust. At Orange Michel Van Den Berghe Cyberdefense, we believe that the digital world can remain a trusted means of leisure, professional opportunities and services that make everyday life easier, more prosperous and fulfilling. © Orange Cyberdefense www.orangecyberdefense.com 4 Security Navigator 2021 Table of contents 5 Table of contents Introduction: What you need to know ..................................................... 6 Technology insight: A dummie's guide to cybercrime ........................ 57 The new realities........................................................................................................................................... 58 CyberSOC Statistics: This is what happened ........................................ 9 Marketplaces ................................................................................................................................................ 58 Funnel: Alert to incident ................................................................................................................................10 Malwaertising, Malware, Exploits, Infrastructure ....................................................................................... 60 Types of incidents, Totals .............................................................................................................................11 Spam & Phishing, Stolen Information, Hackers ......................................................................................... 61 The COVID-19 year .......................................................................................................................................13 Botnets, Money laundering ......................................................................................................................... 62 Patterns during lockdown .............................................................................................................................14 Criminal networks: a ransomware story ..................................................................................................... 63 A day at the office: patterns based on local time ........................................................................................16 Conclusion .................................................................................................................................................... 64 In the still of the night ....................................................................................................................................17 Malware trends ..............................................................................................................................................18 Pentesting stories & CSIRT stories ........................................................ 67 Ransomware .................................................................................................................................................19 CSIRT story: I love the smell of ransomware in the morning! .................................................................... 68 Incident types by size .................................................................................................................................. 20 Story 1: Hi I’m AD\steve-admin, please let me access VLAN2 ................................................................. 70 Incidents in different verticals ...................................................................................................................... 22 Story 2: Red[team] alert ............................................................................................................................... 72 Conclusion .................................................................................................................................................... 26 Technology insight: Video killed the conferencing star ...................... 75 Special: Pentesting the IoT – Bluetooth-LE connected padlock ....... 28 Videoconferencing: Thinking about security ...............................................................................................76 Zoom ..............................................................................................................................................................76 World Watch: Stories about stories ....................................................... 31 Teams, Webex .............................................................................................................................................. 77 Signals .......................................................................................................................................................... 32 Google Meet, BlueJeans ............................................................................................................................. 78 Vulnerabilities ............................................................................................................................................... 33 Tixeo, BigBlueButton, Skype for business, Jitsi Meet ............................................................................... 79 CVE research cascade: Vulnerabilities discovered in security products .................................................. 34 Overview table .............................................................................................................................................. 80 Time to patch ................................................................................................................................................ 36 Conclusion .....................................................................................................................................................81 Threat actors ................................................................................................................................................ 37 CIS advice vs. actual breaches ................................................................................................................... 38 Security predictions: There is no bad weather .................................... 83 Security controls and failures ...................................................................................................................... 39 Part 1: Cybersecurity vs. The Threat .......................................................................................................... 84 Conclusion .................................................................................................................................................... 40 Part 2: Cybersecurity vs. Data Security ...................................................................................................... 85 Part 3: Cybersecurity vs. post-COVID ........................................................................................................ 86 What disrupted this year: Hidden impact of