Beware the Security Threats from Remote Working


We are now in the grip of the virus and society has been forced to rethink its way of life. Working from home has rolled out at pace. Communication platforms and collaborative tools are being embraced worldwide, helped by introductory offers.

Early on, network capacity was considered at risk due to the volume of people working and using services like online gaming all at once. The Austrian regulatory authority, RTR, was one of the first to impose throttling of certain services like video streaming, and companies like Netflix have also taken action to reduce congestion by reducing video quality so that capacity isn’t squandered.

Managing the load on the network is causing CTOs to scratch their heads, too. As they rapidly roll out enterprise VPNs and remote desktop solutions to give employees access to sensitive resources and internal applications, they must find ways to balance the volume on the network. Plus, they need to keep it secure.

So, what should CTOs be doing first?

[You may also like: Protecting Remote Connectivity in Today’s ‘New Normal’]

Protecting Against Service Disruption from DDoS

Taking measures to prevent disruption to critical servers is paramount. Distributed Denial of Service attacks are high up on the list of threats. We know that such attacks create large volumes of ‘garbage’ traffic to saturate the pipe, but they can also be used for more insidious reasons, such as attacking the intricacies of the VPN protocol. A flow as little as 1Mbps can knock a VPN service offline.

Load Balancing

Balancing the volume on the network is also more complex now as more people remotely access the desktop, files, emails and services like Office365 and cloud apps like Salesforce and Workday. This can be managed with load balancing, software defined wide area networks, and web performance optimisation – like FastView.

Putting on-demand applications into the cloud so they can be accessed remotely is also a smart move. Load balancing can then scale up applications regardless of where they are located.

[You may also like: COVID-19: What Does Unemployment Have To Do with Load Balancing?]

But this strategy is greatly undermined if the network and the applications are not secure. It’s therefore imperative there is authentication to validate a user before anything is accessed. People on the network have to be trusted. No one wants a data breach and GDPR fine on top of everything else.

VPN Security

At the start of 2020, VPN security was in the spotlight as multiple vulnerabilities in enterprise VPN products from Pulse Secure, Fortinet, Palo Alto Networks, and Citrix were exploited by malicious actors and nation states alike. Companies responded by patching or withdrawing the remote access and the problem of attacks died back.

However, introducing home working at pace and on a much larger scale, is likely to entice unscrupulous actors into action. Every company needs to undertake special care to ensure the patches are applied before switching any new or extended service on. But more than this, they must commit to maintaining updates and patches during this period of flux. That’s because remote desktop protocol (RDP) has been for the most part of 2019, and continues to be by a fair margin, the most important attack vector for ransomware.

CIOs need to acknowledge that in introducing/extending RDP, they are broadening the attack surface. And that the temporary solutions they are putting in place (that could become permanent) have to be secure at all times.

[You may also like: COVID-19 Related Cyber Security Adjustments]

It’s therefore really important to adapt risk models. It’s possible that some companies won’t be able to think about this right now such is the urgency to keep the business operating. But they must return to it. It would be foolish to roll out new services with emphasis on access and usability and neglect security.

Passwords

From the numerous breaches we have seen in the past, it’s evident that strong passwords or some form of multi-factor authentication (MFA) is an absolute requirement when providing remote desktop access to home workers. Best practice would be to get all employees to reset their passwords as they connect remotely and prompt them to choose a new password that complies within a strong password complexity guideline.

As we know, people have a habit of reusing their passwords for one or more online services – services that might have fallen victim to a breach. Hackers will happily leverage these breach batches and go to town.

Social Engineering

Fear of the virus and a continuous need for up-to-date information provides a great breeding ground for abuse too. CIOs need to remind their teams of the risks posed by weblinks and the infodemic/fake news that’s all around.

[You may also like: Fake News and Bad Bots: The Next Infodemic Weapon]

A good example of this is the abundant phishing campaigns that are luring people in with the promise of important or breaking information on COVID-19. They are designed to entice them to click malicious links or open infected attachments. In the UK alone, coronavirus scams cost victims over £800,000 in February 2020.

It’s a sad reflection of the cybersecurity world – some people have no ethics and will exploit the horrendous humanitarian disaster we face. In January, malicious actors started leveraging public fear of the virus to spread the notorious Emotet malware. Emotet, first detected in 2014, is a banking trojan that primarily spreads through ‘malspam’ and attempts to sneak into computers to steal sensitive and private information. These scams are continuing and we’ll see more invented in the coming months.

Bad Bots

While the world has yet to see reports of fake news generated by machines there’s a high probability it will happen. Spambots are already creating pharmaceutical spam campaigns thriving on the need for information about the virus so it’s only a matter to time before more sophisticated methods are used.

That’s why CIOs need to educate employees on the most popular and obvious bot techniques for infiltrating a network – click bait and comment spamming. Bots inject popular and frequently searched keywords into comments on spam sites to increase the visibility and ranking of the site in search results. ‘Coronavirus’ is a trending search term in Google and using it on a page will ensure the sites come up favourably in search algorithms. People have to understand the mentality of hackers, and the tactics they use, so they can avoid falling in the trap.

All these things combined show the battles CIOs face. They are challenging but not insurmountable. It will require a ‘more speed, less haste’ approach when it comes to rolling out, scaling up and integrating technologies. That’s easier said than done when there are pressures to stay trading, but it is imperative to ensure the actions taken now don’t encourage security disasters in the future.

Note: A version of this article first appeared in IT Pro Portal.

Read “Radware’s COVID-19 Best Practices for Public Clouds” to learn more.

Download Now

Pascal Geenens

As the Director, Threat Intelligence for Radware, Pascal helps execute the company's thought leadership on today’s security threat landscape. Pascal brings over two decades of experience in many aspects of Information Technology and holds a degree in Civil Engineering from the Free University of Brussels. As part of the Radware Security Research team Pascal develops and maintains the IoT honeypots and actively researches IoT malware. Pascal discovered and reported on BrickerBot, did extensive research on Hajime and follows closely new developments of threats in the IoT space and the applications of AI in cyber security and hacking. Prior to Radware, Pascal was a consulting engineer for Juniper working with the largest EMEA cloud and service providers on their SDN/NFV and data center automation strategies. As an independent consultant, Pascal got skilled in several programming languages and designed industrial sensor networks, automated and developed PLC systems, and lead security infrastructure and software auditing projects. At the start of his career, he was a support engineer for IBM's Parallel System Support Program on AIX and a regular teacher and presenter at global IBM conferences on the topics of AIX kernel development and Perl scripting.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

CyberPedia

An Online Encyclopedia Of Cyberattack and Cybersecurity Terms

CyberPedia
What is WAF?
What is DDoS?
Bot Detection
ARP Spoofing

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center