Machine Identities Surge in Nation-state Cyber Attacks

Machine Identities Surge in Nation-state Cyber Attacks

By Greg Tavarez

Nation-state cyberattacks are creating service disruptions, exposing data and creating substantial financial costs. The SolarWinds attack, for instance, compromised thousands of companies by exploiting machine identities to create backdoors and gain trusted access to key assets. Russia’s HermeticWiper attack breached numerous Ukrainian entities days before Russia’s invasion of the country.

Venafi, a provider of machine identity management provider, announced the findings of new research that evaluated the security impact of the increasing number of nation-state attacks and recent shifts in geopolitics.

The study found that 66% of organizations changed their cybersecurity strategy as a direct response to the conflict between Russia and Ukraine, and nearly two-thirds suspect their organization was directly targeted or impacted by a nation-state cyberattack.

“Everyone is a target, and unlike a kinetic warfare attack, only you can defend your business against nation-state cyberattacks,” said Kevin Bocek, vice president, security strategy and threat intelligence at Venafi.

It’s well known that hackers are constantly evolving their attack strategies, which is why security solutions must also be constantly updated to keep pace. One change in attack methods is an increasing use of machine identities in state-sponsored cyberattacks. The digital certificates and cryptographic keys that serve as machine identities are the foundations of security for all secure digital transactions. Machine identities are used by everything from physical devices and software to containers to authenticate and communicate securely.

The SolarWinds attack is an example of the scale and scope of nation-state attacks that leverage compromised machine identities. And, the HermeticWiper attack used code signing to authenticate malware in a recent example of machine identity abuse by nation-state actors.

The only way to reduce risks of machine identity abuse is through a control plane. The control plane for machine identity management provides observability, consistency, reliability and freedom of choice while reducing complexity. Working across clouds, hybrid environments, datacenters and to the edge, the control plane is connected to a technology ecosystem that is the connective fabric to all machines.

Machine identities are used as part of the kill chain in nation-state attacks. Because of that, organizations need to step up their defenses against nation-state attacks.




Edited by Erik Linask
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

MSPToday Editor

SHARE THIS ARTICLE
Related Articles

Produce8 App Update: Slash Unproductive Meetings, Boost MSP Efficiency

By: Greg Tavarez    4/25/2024

Produce8 launched a major update to its flagship application designed to provide MSPs and their clients with unmatched insights into how meetings affe…

Read More

MSP Expo Gold Sponsor ThreatLocker Strengthens Zero Trust Focus with $115M Series D Funding

By: Greg Tavarez    4/25/2024

ThreatLocker's recent announcement of a $115 million Series D funding round only highlights further the increasing demand for better endpoint protecti…

Read More

BreachRx Secures $6.5M Seed Funding

By: Stefania Viscusi    4/24/2024

BreachRx closed a $6.5 million seed round, led by SYN Ventures, with additional support from Overline.

Read More

Bigleaf Networks and NHC Partner to Optimize the Edge

By: Greg Tavarez    4/24/2024

New Horizon Communications Corp. (NHC) entered a strategic collaboration with Bigleaf Networks to offer network communications services to organizatio…

Read More

Secure the Everywhere Work Landscape: Ivanti Launches EASM and Platform Upgrades

By: Greg Tavarez    4/24/2024

The recently released Ivanti Neurons for External Attack Surface management, or EASM, helps combat attack surface expansion with full visibility of ex…

Read More