September 22, 2024
|
News
September 22, 2024
|
News
Government agencies rarely give explicit attention to the growing threat of infostealers, but Down Under, that's changing. The Australian Cyber Security Centre (ACSC) recently released their report The Silent Heist, a deep dive into the infostealer ecosystem. Here are the five most important findings.
Infostealers are often underestimated, perhaps because they are relatively new. However, the ACSC stresses that they pose a direct threat to the security and wellbeing of Australian organisations. This warning is equally applicable to organisations in Europe.
This finding underscores why infostealers are so dangerous: successful cyberattacks often begin when employees log in from compromised personal devices. Attackers use legitimate login credentials obtained from these infected devices, proving that infostealers are a very real risk.
The final five words are crucial: the risk from infostealers has accelerated further in 2024. This applies to both the rise in stolen data being sold and the increase in activities by initial access brokers exploiting this data.
Organisations enabling remote access, especially through BYOD, must be aware of the risks posed by infostealers. Despite the growing threat, adequate measures are often still lacking.Organisations enabling remote access, especially through BYOD, must be aware of the risks posed by infostealers. Despite the growing threat, adequate measures are often still lacking.
The Australians warn that organisations often have little control over personal devices connecting to their network, particularly with remote work – something we also see with our clients.
This highlights the importance of infostealer monitoring. As an organisation, you're responsible for what your employees do with your data on your internal systems, but you lack control over the devices where infections originate. Monitoring new infections helps bridge this gap and provides better control over risks that would otherwise be beyond your reach.