Palo Alto
  • Intro
  • Expanse
  • Chart
  • Report
Background
Background
Palo Alto

UNIT 42 ATTACK SURFACE THREAT REPORT

Unknown assets and cloud dynamism create attack surface risks for all organizations.

Understanding these exposures helps security teams shrink their attack surface to proactively secure their organization. The following findings offer insights into these exposures accessible via the internet, gathered from extensive exposure and threat data collected over 12 months with Cortex Xpanse.

Actively find and fix your unknowns

Xpanse is an Active Attack Surface Management platform that helps organizations find and automatically fix exposures on internet-exposed systems. With Xpanse, organizations routinely uncover 30-40% more assets in their environment than they were aware of.

expanse-logo

Find and fix your unknown unknowns

Without XpanseWithout Xpanse
With XpanseWith Xpanse
Learn More
Reset button
Reset the attack surface
video overlay
top corner borderstop corner borders
locked
0
fake locked
databasered line
database

Misconfigured databases

Databases with weak security, susceptible to data breaches. Ex: Open MongoDB instances, unsecured MySQL servers, etc.

locked
0
fake locked
ftpred line
ftp

Insecure File Sharing Systems

File transfer systems lacking proper security, risking breaches. Ex: Unencrypted FTP, unsecured Telnet, etc.

locked
0
fake locked
locked
0
fake locked
locked
0
fake locked
fingerred line
finger

Misconfigured IT & Security Infrastructure

Incorrectly set up networks, inviting unauthorized access.Ex: Firewall admin pages, poorly configured VPNs, etc.

fingerred line
finger

is fake

is fake

exposedred line
exposed

Exposed Remote Access Services

Unsecured remote access points, prone to unauthorized entry. Ex: Open RDP ports, weak SSH authentication, etc.

exposedred line
exposed

is fake

is fake

lock-treered line
lock-tree

Building Control Systems

Infrastructure management systems, potentially vulnerable to cyberattacks. Ex: Vulnerable HVAC systems, etc.

locked
0
fake locked

0 Issues auto-resolved. 5 Issues awaiting input.

  • Finding 1
  • Finding 2
  • Finding 3
  • Finding 4
  • Finding 5

To assess the dynamic nature of modern IT environments, we studied the composition of new and existing services running on different cloud providers used by an organization over a period of six months.

Background

CLOUD ATTACK SURFACE FLUX

Cloud dynamism is straining security controls

On average over 20% of externally accessible cloud services change every month. Without continuous visibility, it is easy to lose track of accidental misconfigurations and the steady spread of shadow IT within an organization.

Insights

20%

of critical cloud-based IT infrastructure changes every month

45%

of new risks are introduced because of this flux every month

Matt Kraning, CTO, Cortex Xpanse
Organizations should actively monitor their attack surface as it changes constantly and without continuous visibility, there will be several unknown routine exposures that attackers can exploit.”
Matt Kraning, CTO, Cortex Xpanse

Unit 42 analyzed threat intelligence on 30 Common Vulnerabilities and Exposures (CVEs) to characterize how quickly adversaries were able to begin exploiting them.

Background

ATTACKERS MOVE AT MACHINE SPEED

Attackers begin exploits within hours after a CVE is announced

Notably, three of the 30 vulnerabilities were exploited within hours of the CVE public disclosure. Nineteen of the 30 vulnerabilities were exploited within 12 weeks of the public disclosure, highlighting the risks associated with incomplete and inconsistent patching programs.

Insights

3/30

CVE-related exposures
were targeted within a
week of publication

19/30

CVE-related exposures were
targeted within 12 weeks

Greg Heon, Sr. Director of Product, Cortex Xpanse
It is important to acknowledge that while a CVE may fade from the public, it still remains relevant to potential threat actors. Therefore, organizations must continuously find and fix their exposures to shrink their attack surface.”
Greg Heon, Sr. Director of Product, Cortex Xpanse

Unit 42 analyzed 15 remote code execution (RCE) vulnerabilities actively used by ransomware operators. These CVEs were selected based on intelligence information about the threat actor group and their active exploitation within 12 months of publication.

Background

RANSOMWARE DELIVERY

Same-day ransomware delivery

Threat actors targeted three of these critical RCE vulnerabilities within hours of disclosure, and six of the vulnerabilities were exploited within eight weeks of publication.

Insights

3/15

CVE-related exposures were
targeted within hours of the CVE
being published

6/15

CVE-related exposures were used by
these threat actors within eight weeks of
the CVE being published

Marshall Kuypers, Director of Technical Enablement, Cortex Xpanse
Defenders should rely on automated remediation capabilities to find and fix their critical attack surface exposures before attackers find them.”
Marshall Kuypers, Director of Technical Enablement, Cortex Xpanse

The 2022 Unit 42 Incident Response Report reveals that brute-force credential attacks contributed to 20% of successful ransomware attacks. Recent advisories from the U.S. government's CISA and NSA confirm that cybercriminals persistently target RDP as a highly vulnerable attack vector.

Background

RANSOMWARE DELIVERY PROTOCOL

Remote access exposures lead to ransomware

85% of organizations analyzed in this report had at least one internet-accessible RDP instance online during the month.  Across over 600 incident response cases, the 2022 Unit 42 Incident Response Report found that 50% of targeted organizations lacked multifactor authentication (MFA) on key internet-facing systems.

Insights

85%

of organizations analyzed in this report had at least one internet-accessible RDP instance online during the month.

Ross Worden, Senior Consulting Director, Unit 42
RDP is easy to brute force. Organizations should identify and eliminate RDP exposures in their environment. If required, RDP should not be used without MFA enabled and other compensating controls in place.”
Ross Worden, Senior Consulting Director, Unit 42

Organizations across the world experience several routine misconfigurations and accidents that offer easy paths for compromising an organization over the internet.

Background

TOP ATTACK SURFACE EXPOSURES

Routine exposures offer easy access

Web framework takeover exposures, remote access service exposure, and IT and security infrastructure exposures together make up over 60% of all the exposures on the global attack surface. Organizations need to deal with these on a daily basis and eliminate them to better control and shrink their attack surface.

Insights

23%

of all exposures are web framework takeover exposures that allow attackers to actively seek out and target websites running vulnerable software.

20%

of all exposures are remote access services that are vulnerable to brute-force attacks.

Dominique Kilman, Consulting Director, Unit 42
Exposed IT and security infrastructure poses a tremendous risk to the organization.  Attackers will focus on these systems to gain entry into your organization as well as compromise or disable your security measures. Continuous visibility and automation can help you eliminate these exposures.”
Dominique Kilman, Consulting Director, Unit 42
Background

2023 Unit 42 Attack Surface Threat Report

Learn how the attack surface exposures are unique and persistent across different industries around the globe. Download the latest ASM report.

Get ASM Insights

Success!

We sent a copy to your email address, but you can also download the report here.

Please add
assets@emails.paloaltonetworks.com
to your safe senders list.