Page 250 - Cyber Defense eMagazine September 2025
P. 250

Examples from the Real World: How Privilege Caused Disaster

               •  Colonial Pipeline (2021): DarkSide ransomware affiliates were able to shut down fuel pipelines
                   that served the U.S. East Coast by using a  compromised VPN account without multi-factor
                   authentication. $4.4 million was the ransom. The actual loss was a shattered public trust and a
                   national disruption.
               •  Healthcare Providers: Ransomware outbreaks have affected a number of hospitals in the United
                   States,  with  hackers  gaining  access  through  compromised  service  accounts  connected  to
                   legacy systems. When patient data and devices were rendered inaccessible, lives were literally
                   in danger.
               •  Kaseya Supply Chain Breach (2021): Ransomware was distributed to downstream clients by
                   RaaS groups using remote management tools with privileged access, impacting thousands of
                   small businesses worldwide.

            When RaaS operators have your privileged accounts, they don't need  zero-day exploits, as these
            incidents demonstrate.



            Why Conventional Defenses Are Ineffective

               •  Perimeter  Security  Is  Obsolete:  Firewalls  are  useless  once  an  administrator  credential  is
                   compromised.
               •  Inadequate Password Policies: Phishing, dark web credential dumps, and credential theft make
                   it simple to get around complicated passwords.
               •  IAM Is Insufficient: Identity platforms verify your identity, but they hardly ever identify abnormal
                   behavior from privileged accounts in real time.
               •  Fragmented PAM Practices: Rather than viewing Privileged Access Management (PAM) as a
                   dynamic security discipline, many organizations view it as a compliance checkbox.

            RaaS groups take advantage of these flaws by moving swiftly and stealthily within networks, frequently
            going unnoticed until encryption is activated.



            Making the Danger More Human: The Insider and the Forgotten Administrator

            Think  about  a  regional  bank's  system  administrator.  His  privileged  account  was  not  appropriately
            deprovisioned after he left the company two years ago. A RaaS affiliate paid a few dollars to purchase
            his old credentials when they appeared in a dark web marketplace. Thousands of customers' transactions
            were frozen as ransomware quickly spread throughout vital banking systems.

            Or consider an overburdened IT staff that, for convenience, uses the same "master admin" password.
            One team member is tricked into responding to a phishing email. An attacker only needs that one mistake
            to take control of backups, turn off monitoring software, and spread ransomware over the weekend of
            payday.






            Cyber Defense eMagazine – September 2025 Edition                                                                                                                                                                                                          250
            Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.
   245   246   247   248   249   250   251   252   253   254   255