Initial access markets provide cyber criminals with a way to purchase and leverage stolen credentials for nefarious purposes. This blog will detail how you can defend against the threats posed by initial access markets and their associated credential theft.
This is the final part of our series on initial access markets; click here to read part one, describing their history. Click here to read part two on the techniques used by bad actors.
As described in the previous blog, there are many ways to leverage purchased credentials against an individual or organization. To combat them, you need to establish a defense-in-depth approach.
Defense-in-depth describes a layered approach to security involving people, processes, and technologies (PPT) that work together in a concerted effort to prevent credential-based and other attacks. Although there are many aspects to a full defense-in-depth approach, here are some key facets to protecting against initial access market-driven attacks.
In practice, several solutions are required to achieve the various layers involved in a defense-in-depth approach. You can also explore a consolidated security platform to consolidate many of these requirements into a single solution. That way, you can leverage a single pane of glass to manage them all effectively at scale.
As stated before, these are only a handful of the layers involved in a defense-in-depth approach. Another crucial aspect is security awareness training. Covering the people side of PPT, your team needs to know that they are the first line of defense against attacks.
Especially with initial access markets, where phishing and business email compromise (BEC) are usual attack vectors, employees will receive the brunt of attacks. Be sure to train them on how to spot various forms of phishing like social engineering to keep them from clicking risky links or responding to attacker threats.
As cybercrime continues to rise, initial access markets enable adversaries to operate quicker with more targeted attacks. By developing a defense-in-depth strategy, you and your organization can be better prepared to stop them in their tracks.
To learn more, hear from Todyl’s VP of incident response, Aaron Goldstein, as he describes the threat of initial access markets and how to address it in our webinar. Watch it here.