The recent attack on Microsoft Exchange, which seems to have affected anywhere from 30,000 to 60,000 or more organizations, appears to be far more impactful than just email. In fact, it’s extremely alarming across the whole industry supply chain given the types of affected entities from central banks to government agencies. When you think about the potential risks of an attacker not only accessing vast numbers of emails, but also having control over the server or adjacent systems, the blast zone is very wide indeed. Attackers have access to more than just email data in this compromise and we’re likely to see multiple secondary attacks from it.
In this case, the stolen data may be extensive and highly sensitive, with attackers apparently having control for a few weeks – so the extent of abuse may not be immediately know, if ever.
Putting this in perspective, this is a forensic and data security chaos scenario. Another concern is the apparent exposure beyond the initial nation-state attack by other groups exploiting unpatched systems. The list goes on.
It’s also a very clear signal to businesses to revisit not only how they use email and secure infrastructure, but to go beyond and protect sensitive data in and out of their enterprise so that under attack circumstances, the impact and blast zone across the 6 areas of span is much smaller and manageable to a very limited scope, if any. Organizations who haven’t taken this leap may wish to start looking at data-centric approaches to avoid the next attack, as this wont be the last.
First, patch and follow the guidance. No doubt about it, stop the bleeding and assume trust is breached. Conduct forensics. Consider email encryption from a system independent of Exchange for email specifically, and perhaps files. But for sensitive data that should never have been in emails, spreadsheets, databases, SaaS systems whose credentials may be at risk, cloud lakes and analytic platforms, consider tokenizing it – a modern way to ensure data isn’t the blast zone itself.
Tokenization replaces the sensitive data like banking account information, sensitive personal data – phone numbers, passport ID’s, Tax ID’s, health codes, date of birth, email address, and so on. Tokens replace this data with a random but functionally equivalent record or field in the database, data flow, data lake. In most cases, the token can actually be used without needing the live value, for instance in fraud detection analytics where a Tax ID or Bank account number has to behave like one, and be unique, but not specific to a particular person – until really needed. It’s like converting gold to coal, but instead for sensitive data that’s gold to attackers. Nobody wants to sell coal on the dark web or hold coal to ransom. It’s possible to do this at scale, and with more transparent integration strategies, to plug into complex data flows across traditional applications, through modern data engineering, and into data science platforms.
Cybersecurity effectiveness comes from a defense in depth strategy. But a crack in the armor of traditional defenses eliminates the ability to control defense and enables attackers to control from the inside.
There is no way to stop or prevent an attack. All you can do is buy time and mitigate the extent of it. This is what the Accenture quote was about. Leading companies still get attacked, but the blast zone is confined and there are less damaging blasts.
When technologies like data-centric security and tokenization are used, the defense mechanisms that buy time, reduce blast zones and allow attacks to have limited impact are:
If you’d like to learn how this might apply to your organization, you can contact us here – or have chat with one of our experts. They might even be online right now to have a virtual coffee with you – safely right here.