Going for gold in cybersecurity collaboration

Image of padlock against circuit board/cybersecurity background
(Image credit: Future)

This summer’s Tokyo 2021 Olympics have reinforced the Games’ lasting legacy in the form of their motto – “Faster, Higher, Stronger – Together.” As we face more sophisticated and severe ransomware attacks, this motto should inspire a new approach to cybersecurity that is collective, and founded on collaboration at every opportunity.

About the author

David Higgins is EMEA Technical Director at CyberArk.

It’s an approach that is now mission-critical due to the plethora of advanced threats being aimed at organizations, which are becoming increasingly complex as each day passes and more and more difficult for security teams to decipher. That’s why this inspiring motto should prompt a powerful reaction from across the cybersecurity community, in the form of a collective response informed by shared expertise, intelligence, experience and proven processes. This response can’t be a singular endeavor, however. Its range of requirements is far too broad for just one vendor to fulfil, so organizations must recognize the importance of collaborative work in developing holistic solutions that can keep businesses one step ahead of attackers.

Big Game Hunting

Just as we invest plenty of time planning how to secure our defenses, so too do attackers in preparing to strike. Ransomware attackers prepare for big campaigns – often called “big-game hunting” – with extensive reconnaissance and detailed research into social engineering techniques, often scoping out targets for months or years first. More often than ever, their goal is to execute a double-extortion attack which compromises multiple corners of the confidentiality, integrity and availability (CIA) triad. In practical terms, this means they typically seek to encrypt data to hinder its availability, and then threaten to leak it and compromise its confidentiality.

Usually, attackers will look to execute attacks by following four key steps:

1. Launching their initial attacks against endpoints: Using social engineering to identify their targets, an attacker can phish for unsecured credentials to unlock a door to the organization.

2. Escalating privileges and reinforcing their access: After the attackers have uncovered a high enough level of privilege, they can execute the code, alongside taking evasive action to give them time undetected to search for more sensitive data. 

3. Extending the potential impact of the attack: Disrupting backups and deleting files elevates the impact of the attack, while also stealing masses of data which will be extorted at a later date.

4. Deploying ransomware to seal the deal: Files are encrypted and held hostage with a sky-high ransom for release, knowing that the organization is extremely motivated to pay because of the high reputational and monetary cost of downtime.

Making the fight against ransomware a team game

Just stopping malware simply isn’t enough. A winning approach also involves the use of controls to stop attackers from gaining high-level privileges to do harm at every point in the attack chain – which requires a collaborative effort.

In recent years endpoint detection and response (EDR) solutions have come a long way, to the point that they are now an essential part of strong endpoint security. The continuous monitoring, visibility, and in-depth analysis that it offers accelerates security operations efforts, to the extent that 51.6% of compromises were detected by EDR solutions in a recent SANS survey, even though these tools weren’t specifically designed to manage identity and privilege. An endpoint privilege manager allows other security defenses to play their roles more effectively.

Poised to strike

In a recent memo Anne Neuberger, US deputy National Security advisor for Cyber and Emerging Technology, wrote: “All organizations must recognize that no company is safe from being targeted by ransomware, regardless of size or location.”

Clearly, being poised to defend against ransomware can only be one part of any organization's cybersecurity strategy. This defense must be reinforced with ongoing cybersecurity training, information sharing, and having a strong security framework, all as part of a multi-layered strategy.

Neuberger added, “to understand your risk, business executives should immediately convene their leadership teams to discuss the ransomware threat and review corporate security posture and business continuity plans to ensure you have the ability to continue or quickly restore operations.”

Helping organizations become cyber-ready is an essential service. Through collaborative efforts, our industry can provide an effective, accountable, and responsible control of the digital IT environment. Offering organizations the opportunity to protect themselves against the evolving ransomware threats that we face will support them to create a gold-medal worthy security strategy.

TOPICS
David Higgins

EMEA Technical Director, CyberArk.

Read more
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Hack The Box crisis simulation event
“Everyone will experience a hack” - how incident response can protect your organization
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Don’t let holidays be your cybersecurity downfall
A computer being guarded by cybersecurity.
The impact of the cyber insurance industry in resilience against ransomware
Latest in Security
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple H3C Magic routers hit by critical severity remote command injection, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
Lock on Laptop Screen
Medusa ransomware is able to disable anti-malware tools, so be on your guard
Latest in News
An Apple Music pink/pixellated poster advertising DJ with Apple Music
DJ with Apple Music lands, allowing subscribers to build and mix DJ sets directly from its +100 million-song catalog
The Meta Quest 3 and controllers on their charging station which is itself on a wooden desk next to a lamp
Forget Android XR, I've got my eyes on Vivo's new Meta Quest 3 competitor as it could be the most important VR headset of 2025
Samsung Galaxy S25 from the front
The Now Bar on Samsung One UI 7 is about to get a lot more useful – and could soon match Live Activities on iOS
Marvel Rivals
Marvel Rivals will get two new hero skins for Moon Knight and Black Panther this week meaning I'll now need to farm even more Units
An iPhone running iOS 18 on a purple and blue background
iOS 18.4 could launch soon with a major upgrade to your iPhone’s notifications
Netflix Ads
Netflix adds HDR10+ support – great news for Samsung TV owners, but don't expect LG and Sony to do the same any time soon