CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

5 Insiders Who Can Break Your Security

Threats conceived and orchestrated by external adversaries typically draw most of the attention when it comes to explaining the ongoing data breach epidemic. But organizations should not overlook the pernicious threat posed by insiders. In 2014, a year in which an astonishing number of records were breached, insider-aided compromises were to blame for a great many of them.

Still, many organizations have yet to appreciate the extent of the insider threat and thus are failing to adequately invest in protection. This is happening despite the fact that insiders - whether they are malicious or unwitting in nature - can inflict greater harm and be much more difficult to detect than external attackers. As an organization's IT environment expands and grows more complex, IT and security professionals will have more difficulty maintaining visibility into the actions of their users.

Perhaps it's time for a wake-up call, especially considering the wide range of potential assailants. Here are five types of dangerous insiders you're up against (even if some of them don't appear like a threat at first glance):

1. The absent-minded: This type of worker unwittingly places the company at risk due to poor security practices, such as clicking on suspicious phishing links or attachments contained in emails, sending confidential email to a personal email or other cloud service, connecting a vulnerable or malware-infused mobile device to the corporate network, or losing a laptop or USB stick.

2. The revenge seeker: Last year, the FBI and U.S. Department of Homeland Security warned about a spike in cyber cases involving disgruntled current or former employees. This type of worker is a malcontent who acts out by stealing (perhaps to be used a next job) or destroying sensitive data. Many organizations lack the visibility to track an employee's actions on the network - especially ones exploiting legitimate privileges.

3. The privilege abuser: Here again elevated access rights come into play. Many organizations face a breakdown in roles and responsibilities, resulting in this type of employee being granted permission to conduct tasks and reach assets that are not required for their job. An organization with poor visibility into its "privileged user" population is ripe for insider abuse.

4. The partner: Many of the recent data-loss incidents in the news involve the targeted compromise of credentials belonging to this type of worker: a legitimate third-party contractor or other service provider. This is typically accomplished through password-stealing malware or hacked credentials. In this instance, once they have retrieved the credentials, outside hackers pose as trusted users. What makes this particular profile so dangerous is that as more people access the network than ever before, it becomes increasingly difficult to pinpoint such behavior.

5. The colluder: This type of staff member is seen far less frequently than the previous example, but there have been instances in which a trusted insider has worked with an external party to perpetrate a data breach. One example is, during the supply chain process, purposefully creating a vulnerability that will be exploited later by an outside adversary.

Similar to battling the external threat, organizations require a layered approach to cope with interior risks. That means they must: 

Dan Kaplan is manager of online content at Trustwave and a former IT security reporter and editor.

Latest Trustwave Blogs

Behind the Scenes of the Change Healthcare Ransomware Attack Cyber Gang Dispute

Editor’s Note – The situation with the Change Healthcare cyberattack is changing frequently. The information in this blog is current as of April 16. We will update the blog as needed. April 16, 2024:...

Read More

Law Enforcement Must Keep up the Pressure on Cybergangs

The (apparent) takedown of major ransomware players like Blackcat/ALPHV and LockBit and the threat groups’ (apparent) revival is a prime example of the Whack-a-Mole nature of combating ransomware...

Read More

Effective Cybersecurity Incident Response: What to Expect from Your MDR Provider

Companies engage with a managed detection and response (MDR) provider to help ensure they detect cyber threats before they do any damage. The "response" part of the MDR moniker is key to that effort,...

Read More