Security News > 2022 > April > How many steps does it take for attackers to compromise critical assets?

How many steps does it take for attackers to compromise critical assets?
2022-04-07 04:00

The XM Cyber research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-prem, multi-cloud and hybrid environments.

They fail to show how these seemingly unrelated issues form hidden attack paths that hackers can use to pivot through a hybrid cloud environment and compromise critical assets.

The report takes the attackers' perspective to show how, once they get a foothold in the network, they can easily move towards critical business assets.

Key insights 94% of critical assets can be compromised within four steps of the initial breach point.

Hybrid cloud computing architecture is especially vulnerable, as attackers can exploit security gaps to obtain a foothold in the network and then move laterally between on-premises and cloud applications.

"When siloed teams are responsible for different components of security within the network, nobody sees the full picture. One team may ignore a seemingly small risk, not realizing that in the big picture, it's a stepping stone in a hidden attack path to a critical asset. To keep pace with today's technology and business demands, attack path remediation must be prioritized."


News URL

https://www.helpnetsecurity.com/2022/04/07/attack-critical-assets/