Unit 42 Highlights Enterprise Attack Surface Risks

Lilu Anderson
Photo: Finoracle.net

Understanding Enterprise Attack Surface Vulnerabilities

Palo Alto Networks’ Unit 42 has issued an important warning to enterprises about the increasing vulnerability of their attack surfaces. This report sheds light on how application layer protocols like SNMP, NetBIOS, and PPTP are particularly susceptible to attacks.

The attack surface of an organization represents all possible points where an unauthorized user could enter or extract data. As companies introduce or update an average of 300 services monthly, keeping up with security becomes a daunting task. In sectors like telecommunications and insurance, this number can exceed 1,000 services a month, intensifying the challenge for security teams.

The Risk of Rapid Service Expansion

Unit 42 highlights that rapid addition of services often lacks central IT security oversight, leading to misconfigurations and exposures. This scenario significantly increases the risk of breaches. Their Attack Surface Threat Report involved analyzing attack surface threats from 265 organizations globally over a year. Their findings revealed that new and updated services contribute to nearly 32% of high or critical cloud exposures.

Types of High-Risk Exposures

IT and networking infrastructure, business operations applications, and remote access services comprise 73% of high-risk exposures. Remote access services like Remote Desktop Protocol (RDP) and Secure Shell (SSH) are particularly concerning. When misconfigured, these can lead to unauthorized access.

Furthermore, unpatched systems and weak cryptography create entry points for attackers. For example, an unpatched router can allow an attacker to intercept network traffic, leading to data breaches.

Internet-Facing Vulnerabilities

Internet-facing resources are prime targets for attackers. Each unaddressed vulnerability in these resources represents a potential entry point. Attackers are capable of scanning huge numbers of IP addresses quickly; once inside, they can extract data swiftly, sometimes within a day.

Recommendations for Enhanced Security

To mitigate these risks, Unit 42 recommends organizations conduct continuous, comprehensive scans of their ports and devices. Creating an updated inventory of internet-connected assets can help identify and remedy vulnerabilities promptly.

Organizations should prioritize vulnerabilities using the Common Vulnerability Scoring System (CVSS) and the Exploit Prediction Scoring System (EPSS) to focus on the most critical ones.

Additional Security Measures

  • Regularly Review Perimeter Resources: Ensure you can distinguish between expected and unknown assets.
  • Utilize Automation: Automate the triaging and remediation process to quickly address vulnerabilities.

An accurate view of the attack surface is essential. Automation can help streamline finding asset owners and mitigating threats, which is crucial as new services are often added without IT oversight.

Share This Article
Lilu Anderson is a technology writer and analyst with over 12 years of experience in the tech industry. A graduate of Stanford University with a degree in Computer Science, Lilu specializes in emerging technologies, software development, and cybersecurity. Her work has been published in renowned tech publications such as Wired, TechCrunch, and Ars Technica. Lilu’s articles are known for their detailed research, clear articulation, and insightful analysis, making them valuable to readers seeking reliable and up-to-date information on technology trends. She actively stays abreast of the latest advancements and regularly participates in industry conferences and tech meetups. With a strong reputation for expertise, authoritativeness, and trustworthiness, Lilu Anderson continues to deliver high-quality content that helps readers understand and navigate the fast-paced world of technology.