How to prevent suffering from malicious misuse of your data – a risk revealed by the recent breach at DocuSign, where hackers impersonated the electronic document company to distribute malware.
The DocuSign episode is an example of a multi-stage threat. In the DocuSign case, the multi-stage threat involves malicious misuse of data assets by hackers. Stage one was the initial data breach. This was problematic, but on the surface, its potential impact on DocuSign’s business was relatively low. It was embarrassing, but not deadly. Stage two was the malicious misuse of DocuSign customer information. Used for the sophisticated spear phishing that took place, later on, this was a much more serious threat.
If you’ve ever bought or sold a home, you’ve probably used DocuSign, the leading electronic document management company. The service has over 100,000,000 users. DocuSign facilitates the execution of legally binding contracts online using electronic signatures.
Now, imagine you got a signature request over DocuSign from someone you know. It’s routine, or so it seems. When you download the document, however, your device gets compromised by malware. What went wrong?
Did a hacker infiltrate DocuSign and embed malware in their code? That would be quite a feat. But, something like it did happen recently. As reported in Krebsonsecurity, hackers breached DocuSign’s defenses and stole customer names and email addresses. A cybersecurity professional might deem this as “low value” data, but the nature of the attack shows this assumption to be mistaken.
The attackers proceeded to impersonate DocuSign with realistic-looking web pages and forms. They sent out signature requests to DocuSign customers by posing as DocuSign. Unsuspecting users, already familiar with the service, unknowingly clicked on malware links and were infected.
How Multi-Stage Threats Challenge the “Heat Map” Approach to Cybersecurity
The DocuSign episode is an example of a multi-stage threat. In the DocuSign case, the multi-stage threat involves malicious misuse of data assets by hackers. Stage one was the initial data breach. This was problematic, but on the surface, its potential impact on DocuSign’s business was relatively low. It was embarrassing, but not deadly. Stage two was the malicious misuse of DocuSign customer information. Used for the sophisticated spear phishing that took place, later on, this was a much more serious threat.
DocuSign’s exposure is significant, going beyond a mere security incident to encompass damage to brand image and possible legal liability. Their whole business and brand are built on the perception of integrity. The breach tarnishes that image in addition to causing direct, financial damage to the firm. This is the risk that virtually every business faces from multi-stage threats.
A multi-stage threat creates multiple risks. As a result, they challenge the conventional cybersecurity “heat mapping” process of matching countermeasures to threats. In a heat map, a security manager identifies your most valuable data assets and systems. Then, factoring in the probability and potential business impact of an attack, they focus security resources on the areas with the great potential for attack and highest business impact.
Using this approach, the database holding customer names and email addresses would probably receive a lower “heat” level and a commensurately smaller investment in cyberdefense. A more critical system, like the repository of signed electronic documents, would likely be rated “hotter” and get more robust and costly countermeasures.
While the heatmap approach is useful in many situations, it is not well suited to a malicious misuse case like the one suffered by DocuSign:
In the DocuSign example, two common and lower-level attacks combine to form a much greater threat. A simple data breach gave hackers the ability to conduct spear phishing. The two threats merged. In spear phishing, the attacker impersonates an individual known to an email recipient. The intent of spear phishing is to trick the recipient into clicking on a malware link or sharing login credentials to a system.
Spear phishing can be difficult to prevent because its emails are personalized, informal and lacking in identifiable markers of fraud, e.g. “I’m a Prince with a million dollars. Can you help me?” Those can easily be flagged by spam and malware filters. Spear Phishing emails often slip through such filters.
It is highly probable that the DocuSign attack also involved social engineering. The attackers might have cross-referenced public records of real estate transactions and posed as a realtor or other named individuals that recorded the deeds. The phishing victim would be getting an email from a person known to be associated with a recent real estate deal. The email asks the recipient to click on a DocuSign link. It looks legitimate. It would take extreme vigilance to detect any sort of wrongdoing in this case.
Are You at Risk for Malicious Misuse of Your Data?
Your business may be exposed to risks of multi-stage attacks like malicious misuse of your data assets. The exact nature of the attack will, of course, depend on your business, but one can imagine a variety of scenarios:
Defending Against Malicious Misuse
As providers of IT security and IT services for small to mid-sized businesses, we can tell you that effective prevention of malicious misuse is quite challenging. However, there are a number of things you can do to improve your defenses against this kind of threat without spending a lot of money. These include:
Conclusion
We work with small to mid-sized businesses to help them improve their cybersecurity postures. In our experience, it is possible to build robust defenses with reasonable, incremental investments in highly targeted solutions. There is no 100% guaranteed defense against a threat like malicious misuse, but we can help you bolster your protections and preparedness.