The most common attack vectors in 2022: symptoms and mitigation

Hi, folks, I would like to present my chart of the most common attack vectors in 2022. The article follows my research started in Top 10 cloud attack threads and vectors

Attack vectorsSymptomsRemovingMitigation
Malware infectionHard drive or files are not accessible
New file and folders
System restore is not function
Quarantine the infected systems
Disable System Restore (if using a Windows machine)
Remediate the infected system
Schedule automatic updates and scans
Enable System Restore and create a new restore point
Provide end user security awareness training
If a boot sector virus is suspected, reboot the computer from an external device and scan it
Scanners to detect a file containing a rootkit before it is installed
Verify your email servers aren’t configured as open mail relays or SMTP open relays
Remove email addresses from website
Use whitelists and blacklists
Train and educate end users
Data loss and exfiltrationInsufficient data traffic spikes
Incsiased number of requests to uninedified endpoint
Unrecognized usb or network devices
Identify and block insufficient process or user
Provide full forensics
Monitors the data of a system while in use, in transit, or at rest to detect attempts to steal the data
Technical limitations placed on a system in regards to the utilization of USB storage devices and other removable media
Create administrative controls such as policies
Encryption scrambles data into unreadable information
Self-Encrypting Drive (SED)
Use data loss prevention (DLP) system
Mobile device and appDevice is stolen
New unrecognized device detected
Attempt to log in from insufficient location or device
Isolate device from network
Provide full investigation
Hardening of mobile device
Creating a clear separation between personal and company data on a single device
Centralized software solution for remote administration and
configuration of mobile devices with MDM
MFI and conditional logging
Choose Your Own Device (CYOD) instead of Bring Your Own Device (BYOD)
Security policy for mobile devices
MisconfigurationsInsufficient number of connection
Unrecognized ports opened
Disabled anti-virus or monitoring service
Spike in ICMP calls
A number of not complete handshake
Block insufficient inbound/outbound ports
Restrict access to the system
Enable logging and monitoring
Restrict access to inbound/outbound ports
Use secret management
Block ICMP protocol
Automated backup in secure location
Could storage access control with principal of least privileges
Use TLS 1.2 or higher
Restrict access to VMs, containers and hosts by policies and managed identity
Prevent Cross Site Scripting (XSS) and cross site request forgery (CSRF)
Man-in-the-middlePop-ups or captive portal pages asking for credentials
Login pages appear that don’t look legitimate
Fake software update pop-ups
Certificate error messages
Rogue access point (AP)
APs with the same name
ARP or DNS cache tables contains unknown hosts
DHCP request flooding
Locate and isolate unknown device
Restore/rebuild cache tables
Blacklists specific endpoint or addresses
Provide full forensics
Use HTTPS or VPN connection outside of office
Multi-factor authentication (MFI)
Periodical audit all of network devices
Force AP secure connection
Use WPA2
Connect to known vendors/track supply chain
Train and educate end users

What is your opinion?

Please comment me back,

be ethical,

save your privacy!

subscribe to newsletter

and receive weekly update from our blog

By submitting your information, you're giving us permission to email you. You may unsubscribe at any time.

Leave a Comment

Discover more from #cybertechtalk

Subscribe now to keep reading and get access to the full archive.

Continue reading