Security News > 2021 > July > CISA Releases Analysis of 2020 Risk and Vulnerability Assessments
The United States Cybersecurity and Infrastructure Security Agency has published the results of the Risk and Vulnerability Assessments it conducted in fiscal year 2020, revealing some of the security weaknesses that impact government and critical infrastructure organizations.
CISA conducted a total of 37 RVAs, leveraging the MITRE ATT&CK framework to provide a better understanding of risks and help organizations remediate weaknesses that threat actors might abuse in live attacks to compromise network security controls.
In a report published last week, CISA details an attack path comprising six successive steps, namely initial access, command and control, lateral movement, privilege escalation, collection, and exfiltration.
In its assessments, CISA successfully used phishing links for initial access in 49% of the attacks, web protocols were employed for command and control in 42% of RVAs, while pass the hash was used for lateral movement in roughly 30% of attacks.
"After conducting trend analysis on the 37 RVA reports executed by CISA, several high-level observations were identified. Methods such as phishing and the use of default credentials were still viable attacks. This shows that the methodologies used to compromise much of our infrastructure have not changed drastically over time. As a result, network defenders must refocus their efforts at deploying the myriad of mitigation steps already known to be effective," CISA notes.
Organizations can contact CISA for a Risk and Vulnerability Assessment.
News URL
Related news
- CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability (source)
- CISA Adds ScienceLogic SL1 Vulnerability to Exploited Catalog After Active Zero-Day Attack (source)
- CISA Warns of Active Exploitation of Microsoft SharePoint Vulnerability (CVE-2024-38094) (source)
- CISA Alerts to Active Exploitation of Critical Palo Alto Networks Vulnerability (source)