Getting your Trinity Audio player ready...
|
In New Zealand, the emphasis on cloud-based infrastructure is substantial, with a plethora of initiatives and partnerships aimed at propelling digital transformation and enriching cloud services for businesses and organisations. This strategic shift towards cloud-based infrastructure is being harnessed across diverse sectors to bolster operational efficiency, fortify cybersecurity measures, and augment accessibility to digital resources.
As organisations in New Zealand continue to modernise their systems and migrate to cloud-based infrastructure, cybersecurity emerges as a paramount concern. One of the critical aspects of cybersecurity in this context is ensuring the protection of data stored and transmitted through cloud services.
The recent advisory issued by the UK’s National Cyber Security Centre (NCSC UK) concerning APT29, underscores cyber threats’ dynamic and ever-evolving landscape. This advisory serves as a poignant reminder of the criticality of remaining vigilant, informed, and prepared in the face of increasingly sophisticated cyber adversaries.
NCSC UK and international partners have assessed APT29 as a cyber espionage group. This attribution is supported by agencies such as the US National Security Agency (NSA), the US Cybersecurity and Infrastructure Security Agency (CISA), the US Cyber National Mission Force (CNMF), the Federal Bureau of Investigation (FBI), the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the Canadian Centre for Cyber Security (CCCS), and NCSC NZ. These organisations agree with the details in the advisory, emphasising the need for a coordinated international response to cyber threats.
One of the critical aspects highlighted in the advisory is the adaptation of APT29 to target organisations transitioning to cloud-based infrastructure. This highlights the importance of understanding threat actors’ specific tactics, techniques, and procedures (TTPs) in the cloud environment. One tactic observed is the exploitation of service and dormant accounts.
APT29 has used brute force and password-spraying techniques to access these accounts, which are often highly privileged and used to manage applications and services. Organisations can mitigate this risk by enforcing strong password policies, implementing multi-factor authentication (MFA), and regularly auditing and deactivating dormant accounts.
Another tactic employed by APT29 is the use of cloud-based token authentication. Threat actors can bypass traditional authentication methods by using tokens to access accounts without needing a password.
Organisations can protect against this by adjusting token validity times and implementing strong MFA policies. Enrolling new devices on the cloud is another avenue exploited by APT29. By registering their device as a new device on the cloud tenant, threat actors can gain unauthorised access to the network. Organisations can defend against this by configuring network policies to validate devices before granting access.
To evade detection, APT29 has also utilised residential proxies to hide their true IP addresses. This underscores the importance of comprehensive logging and monitoring to detect and respond to suspicious activity. Implementing network defences that consider a variety of information sources can help mitigate this risk.
The guidance in the advisory serves as a reminder of the importance of a strong cybersecurity posture, mainly as organisations increasingly rely on cloud infrastructure. Remaining informed about the latest cybersecurity trends and threats is imperative for organisations to identify and address vulnerabilities in their systems proactively. This knowledge empowers them to implement necessary security measures and mitigations effectively.
Moreover, collaboration with cybersecurity experts and sharing information with other organisations can significantly enhance overall cybersecurity posture, as collective insights and experiences can inform better defence strategies. By staying vigilant and implementing the recommended mitigations, organisations can substantially improve their ability to protect their networks and data from cyber threats. This approach is crucial in the face of evolving cyber risks and threats.
It is critical that New Zealand, like any other country, continuously adapts and improves its cybersecurity practices to protect its data and systems in the digital age effectively. Only through ongoing efforts and collaboration can organisations and countries effectively mitigate cyber risks and ensure a secure digital environment.