Cisco Talos Blog: Talos IR trends Q4 2024: Web shell usage and exploitation of public-facing applications spike

Source URL: https://blog.talosintelligence.com/talos-ir-trends-q4-2024/
Source: Cisco Talos Blog
Title: Talos IR trends Q4 2024: Web shell usage and exploitation of public-facing applications spike

Feedly Summary: This new report from Cisco Talos Incident Response explores how threat actors increasingly deployed web shells against vulnerable web applications, and exploited vulnerable or unpatched public-facing applications to gain initial access.

AI Summary and Description: Yes

Summary: The text describes a significant shift in threat actor tactics, with a newly observed reliance on web shells for initial access to vulnerable web applications, alongside trends in ransomware incidents. Notably, organizations are urged to strengthen access controls and authentication methods, especially Multi-Factor Authentication (MFA), in light of increasing password-spraying attacks and various exploit techniques. These insights are crucial for security professionals in the realms of cloud computing, infrastructure, and information security.

Detailed Description: The content outlines various trends and tactics observed in threat actor activities during the fourth quarter, emphasizing the following key points:

– **Web Shells Usage**:
– The deployment of web shells against vulnerable applications surged to 35% of incidents, reflecting a major tactic shift from the previously dominant strategy of exploiting valid accounts.
– Specific instances are noted, such as the use of PHP web shells and tools like Fuzz Faster U Fool for brute force attacks.
– This highlights the necessity for robust patch management and securing public-facing applications.

– **Ransomware Trends**:
– Ransomware and data theft incidents constituted nearly 30% of engagements, a slight decline but still significant, with BlackBasta ransomware gaining attention as a serious threat.
– Complex attack methods, including social engineering and credential harvesting, underscore vulnerability in identity and access management practices.

– **Initial Access Techniques**:
– A notable transition from valid accounts to web application exploitation as the most common initial access method, stressing the importance of cybersecurity measures for web servers.
– Continual observation of password-spraying attacks calls for enhanced password policies and the implementation of MFA.

– **Recommendations for Security Enhancements**:
– Enforce MFA across all critical access points to protect against social engineering attacks.
– Regularly patch and replace outdated systems to mitigate exploit risks associated with unpatched software.
– Utilize endpoint detection and response (EDR) solutions, and consider outsourcing to Managed XDR vendors if internal resources are insufficient.

– **Target Industries**:
– The education sector continues to be one of the most targeted industries, necessitating specific defenses tailored to their operational structures.

– **MITRE ATT&CK Framework Insights**:
– Various ATT&CK techniques were mapped to observed incidents, reinforcing the importance of understanding these methodologies for effective threat detections and countermeasures.

This detailed analysis indicates a shifting landscape in cybersecurity threats and methodologies, where organizations need to adapt quickly to evolving strategies, particularly in the context of information and infrastructure security.