Threat IntelHIGH

CISOs Can Learn from Musk Oxen - Third-Party Risks Explained

Featured image for CISOs Can Learn from Musk Oxen - Third-Party Risks Explained
#APT29#TeamViewer#Third-Party Risk Management#Cybersecurity#FS-ISAC

Original Reporting

CSCSO Online

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

High severity — significant development or major threat actor activity

🎯
🎯 THREAT ACTOR PROFILE
Threat Actor / APT GroupAPT29
AliasesCozy Bear
AttributionRussian State-Sponsored
Target SectorsAll Sectors
Target RegionsGlobal
Active Since2014
Campaign NameSupply Chain Attacks
Primary TTPsSpear Phishing, Credential Dumping
Tools UsedTeamViewer, Other Remote Access Tools
MITRE ATT&CKT1566, T1071
MotivationEspionage
🎯

Basically, CISOs can learn teamwork from musk oxen to better manage risks from third-party vendors.

Quick Summary

CISOs can learn valuable lessons from musk oxen about managing third-party risks. Recent cyberattacks highlight the importance of collaborative strategies. By working together, organizations can enhance their security posture against vulnerabilities.

What Happened

CISOs face significant challenges in managing third-party risks, which can lead to severe business consequences if not addressed properly. Recent cyberattacks on third-party vendors, such as the one involving the Russian hacker group APT29 targeting TeamViewer, underscore this risk. Despite not using TeamViewer, companies rely on numerous similar tools, raising concerns about potential vulnerabilities.

Who's Affected

Almost all organizations depend on various third-party vendors integrated into their software supply chains and business processes. This reliance can involve hundreds or even thousands of partners, increasing the risk of cyberattacks. The stakes are high, as a breach in a single vendor can disrupt critical business operations.

The Threat

The inherent risks of collaborating with third-party vendors are exacerbated by several factors:

  • Limited Transparency: Vendors often provide outdated information, failing to reflect their current risk posture.
  • Increased Complexity: Many vendors work with subcontractors, complicating the risk landscape.
  • Underdeveloped Processes: Some vendors may not have robust cybersecurity policies, putting client organizations at risk.
  • Lower Investment: Many vendors allocate limited budgets to cybersecurity, affecting the security of their services.

Tactics & Techniques

Despite the development of best practices and playbooks, many organizations struggle to effectively mitigate third-party risks. Vendor assessments often become mere checkbox exercises, and contractual negotiations for stricter security requirements frequently fall short. Continuous monitoring and incident response plans are useful but do not fully address the underlying risks.

Defensive Measures

The author proposes a 'Musk Oxen Strategy' for CISOs to improve third-party risk management. This approach emphasizes collaboration among organizations to create a protective network around vulnerable vendors. Key steps include:

  1. Identifying high-risk vendors and creating a 'Hot List'.
  2. Sharing this list with other companies to identify common concerns.
  3. Negotiating collective security measures for these vendors, enhancing overall security.

This strategy mirrors how musk oxen protect their young by forming a circle, with stronger members on the outside. By working together, organizations can better shield themselves from potential threats.

Conclusion

While the Musk Oxen Strategy may raise legal concerns regarding competition, it has the potential to significantly enhance third-party risk management. By fostering collaboration and support among organizations, CISOs can create a more secure environment against the ever-evolving landscape of cyber threats.

🔍 How to Check If You're Affected

  1. 1.Review your third-party vendor list for potential risks.
  2. 2.Conduct assessments of third-party security practices.
  3. 3.Implement continuous monitoring for third-party services.

🏢 Impacted Sectors

All Sectors

Pro Insight

🔒 Pro insight: The Musk Oxen Strategy emphasizes collective defense in third-party risk management, crucial for mitigating potential cyber threats.

Sources

Original Report

CSCSO Online
Read Original

Related Pings

HIGHThreat Intel

Contagious Interview Campaign Expands - New Malicious Packages Found

The Contagious Interview campaign is growing, with new malicious packages targeting sensitive data. North Korean group UNC1069 is behind this expansion, raising alarms for users.

SC Media·
HIGHThreat Intel

Russia's Fancy Bear APT Continues Its Global Onslaught

Russia's Fancy Bear APT is on the attack again, targeting various organizations. Experts warn that patching and zero trust measures are essential. Stay vigilant to protect against these sophisticated threats.

Dark Reading·
HIGHThreat Intel

CyberAv3ngers - IRGC-Linked Group Targets Critical Infrastructure

CyberAv3ngers, an Iranian state-backed group, is targeting U.S. critical infrastructure, exposing over 5,200 devices to potential attacks. Immediate action is needed to bolster cybersecurity.

Tenable Blog·
HIGHThreat Intel

NERC Actively Monitoring Grid Amid Iran-Linked Cyber Threat

Hackers are targeting U.S. critical infrastructure, raising alarms. NERC is closely monitoring the grid for potential disruptions. This threat emphasizes the need for robust cybersecurity measures.

Cybersecurity Dive·
HIGHThreat Intel

Threat Hunters' Gambit - Outsmarting Evolving Threat Actors

Bill Largent reveals how strategy games can sharpen threat hunting skills. By understanding patterns, analysts can outsmart evolving cyber threats. Discover how to defend against these tactics.

Cisco Talos Intelligence·
HIGHThreat Intel

Treasury Department Launches Cyber Threat Sharing for Crypto

The U.S. Treasury is sharing cybersecurity intelligence with cryptocurrency firms to combat rising cyber threats. This initiative aims to protect digital assets and enhance industry resilience. Eligible companies can access vital security information at no cost, promoting a safer digital ecosystem.

The Record·