Top network security threats

Share on facebook
Share on twitter
Share on linkedin
Share on email
network security threats

Stay up to date

Stay up to date with the latest threat reports, articles & mistakes to avoid.

Simple, yet important content.
No salesy pitches and all that, promise!

With the evolving technology and its large scale adoption of businesses choosing to transact online, network security threats keep rising. It’s a hard truth.

In today’s ever-evolving IT landscape and the app-driven world, businesses cannot afford to overlook or under emphasise the importance of ensuring protecting their assets that include network, applications, systems and devices. With attackers getting better and more innovative, network security threats exploited by threat actors could bring businesses to a screeching halt. We saw these threats taken advantage of in the case of Norsk Hydro and other multinationals where production systems were hit.

Security threats can affect and interfere with critical business resources, undermine computer networks, and compromise sensitive dataUnderstanding what these threats are, in what forms they come, and their solutions will better equip companies to build effective responses against systemic attacks while safeguarding their networks. 

In this blog, we will describe what network security threats are and how best to deal with them. You will also get to see instances where network attacks occurred and relevant solutions to prevent such occurrences in your environment. 

What are network security threats?

Network security threats are potential opportunities that could be exploited by attackers to cause harm by gaining unauthorised access to systems and resources. The objective behind cyber attacks is usually to steal data and actualise other malicious aims. 

A company’s network security is at most risk when there are vulnerabilities in their assets such as systems, networks and applications. The security threats affecting these assets pose increasing risks when businesses aren’t aware of such weaknesses. Malicious threat actors have more time at their hands during such situations, allowing them to take advantage of these security weaknesses to infiltrate into businesses.  

After gaining an initial foothold, attackers often take advantage of other weaknesses to perform further actions such as lateral movement to hop around the internal environments, compromising other assets or leave persistent backdoors for continued access at later date. 

There are two main types of network attacks based on their activity.

Passive attacks: A passive attack is a network attack in which target systems are monitored and sometimes scanned to gather information. It is more like spying on the targets’ activities.

No data is changed or the state of the system remains unchanged. Attackers use this information to prepare an attack layout that involves active intrusion. An example of a passive attack is an attacker who is suitably positioned to monitor the network traffic without changing the contents.

Active attacks: On the flip side, attackers actively pursue the target by attacking it and exploiting the weaknesses to gain unauthorised access. This could be gaining standard user access or escalating privileges to administrator privileges. It also involves altering data, either deleting, encryption or otherwise infecting it. 

Examples of active network attacks include man-in-the-middle attacks and ransomware attacks.

Possessing the necessary devices and software that identify and categorise network security threats and vulnerabilities in your network is critical.

active vs passive attacks 

Common types of network security threats

There are many types of network security threats that affect organisations externally (over the internet) and internally (inside the perimeter). Below, we identify some of the most common security threats that pose risks to computer systems.

Insider threats

Insider threats are security threats that originate from inside an organisation. This could be a former employee or current staff such as negligent employees or disgruntled employees. 

Many times it includes gaining higher privileged access through social engineering within the organisation. Other scenarios include misusing one’s privileges where an employee has access to networks, systems, devices or other sites storing sensitive data. Insider threats within cyber security could be either of three types:

  1. Unintentional insiders
  2. Negligent insiders 
  3. Problematic insiders 

Supply Chain Attacks

A supply chain attack occurs when attackers gain unauthorised access to a company’s network through a third-party vendor’s trusted access route. In December 2020, SolarWinds detected a massive nation-state backed cyber-attack in its network. These attackers had infected SolarWinds’ Orion with malicious code, which they piggybacked to transmit malware to the customers running SolarWinds product.

The US government is still investigating the Orion software attack. Many companies have been unaware of the range to which their systems were compromised. Recent examples such as SolarWinds’ emphasises the need for enterprises to restrict supply-chain vendors access to their networks. According to IBM’s 2020 Data Breach report, weaknesses in third-party software cause 16% of all data breaches.

Discuss your concerns today

Ransomware 

In 2014, the APWG estimated that nearly one-third of the world’s computers housed malware. Also, in 2016 ransomware attacks were launched on businesses every 40 seconds. Now in 2021, Cybercrime Mag estimates an occurrence every 11 seconds.

Network-based ransomware is an active threat that aims to paralyse critical software and data. This threat is alarming as it renders victim data useless by encrypting it and demanding a ransom to get decryption keys. Common attack vectors of ransomware include phishing attacks, abuse of RDP open to the internet and exploitation of vulnerabilities in the software or hardware used by organisations. 

Data can be compromised or lost altogether on an infected device unless the device owner agrees to pay a ransom. Paying a ransom is not a recommended practice for various reasons. These include lack of surety if data will be decrypted and use of funds for illegal purposes. 

In 2020, a sick woman died due to a ransomware attack that caused a German hospital’s IT systems to fail. This patient needed emergency medical services, which weren’t accessible due to the ransomware attack disrupting computing systems.   

Ransomware attacks have advanced at alarming rates. Most of this growth has been encouraged by the creation of cryptocurrencies that allow cybercriminals to demand ransoms anonymously. Small businesses and some county governments have also contributed to paying ransoms to cyber criminals to get their data back. This must be a carefully considered decision whether a ransom should be paid

Phishing  

Phishing threats are one of the most common security threats in today’s world. Phishing is a cyber crime where victims are contacted by phone, email or text by someone posing as legitimate contact to tempt someone to perform an action to start a malicious event. This initial event could be clicking a link, downloading and executing an executable file as an attachment or submit sensitive information to a website.

To reduce the risks of phishing, user education, technical processes and controls are important. This includes user training, continuously updated and interactive training materials to include the latest network security threats and ensuring improved behaviours of staff towards digital risks.  

Privilege Escalation

Attackers use privilege escalation to extend their reach once they have penetrated a computer network. With horizontal privilege escalation, attackers potentially access adjacent systems or accounts within the same environment. And with vertical escalation, attackers can even gain higher levels of access to compromise business-critical assets such as production databases and domain controllers.

Insecure Applications and API

Modern web applications are often developed under deadline pressures, forgetting to follow secure coding practices. This lack of secure SDLC practices leads to shortcuts in code and oversights on the application security side. These websites accept user inputs, failing to verify and sanitise the inputs securely. 

Attackers take advantage of this oversight in a variety of ways. The most famous security risks in web applications are OWASP top 10 application risks and API risks. The OWASP Top 10 web application vulnerabilities are:

  1. Injection attacks such as SQL injection attacks
  2. Broken authentication
  3. Sensitive data exposure
  4. XML External Entities (XXE)
  5. Broken access controls
  6. Security misconfigurations
  7. Cross-site scripting (XSS)
  8. Insecure deserialization
  9. Using components with known vulnerabilities
  10. Insufficient logging and monitoring

At the centre of SQL injection attacks is the lack of validation and sanitisation of the web app’s information.  

threats to network security

Man in the Middle Attacks

A man in the middle attack is a cyber attack where the attacker takes a privileged position to monitor the communication between the two parties. 

Attackers intercept traffic that could be between an organisation’s network and external sites or within their network. If communication is not encrypted or attackers manage to bypass any security measures, they may steal transmitted data, alter the information, obtain user IDs and hijack their sessions. Here’s an example to understand this better:

Let’s say an attacker wants to intercept communications between Mr A and Miss B. Mr A sends his public key to Miss B, but the hacker interrupts it. The hacker sends a falsified message to Miss B, portraying themselves as Mr A, but instead, it carries the attacker’s public key. Miss  B unassumingly encodes the message with the attacker’s public key and sends it back to Mr A. Still, the attacker intercepts the message again, opens it with their private key, possibly modifies it, then re-encodes it using the public key initially provided by Mr A. When the hacker sends the message back to Mr A, they again believe it comes from Miss B, and this way, the attack continues.

Some common types of MITM attacks are:

  • HTTPS spoofing
  • IP spoofing
  • DNS spoofing
  • Email hijacking
  • WiFi eavesdropping
  • SSL hijacking
  • ARP spoofing 

Discuss your concerns today

DoS and DDoS Attacks

A Denial of Service (DoS) attack is a cyber attack where a target system is attacked to render its resources unavailable to its legitimate users. 

A Distributed Denial of Service (DDoS) attack involves intentional paralysing of a network by flooding it with large amounts of data sent from hundreds of computers that are often compromised hosts. Distributed denial of service (DDoS) attacks are one of the biggest threats on the internet today. To carry out such attacks on a scale, botnets are used to carry out the attacks. Botnets are large groups of compromised computers remotely accessed by attackers and used to overwhelm networks and servers. The attackers overload business networks with fake traffic, making it impossible for actual users to access these resources. 

Although DDoS attacks are not as rampant as malware infections, they are capable of rendering businesses offline for hours to days. The computers used in these operations – located anywhere globally – are often hijacked by attackers who use remote access to launch a coordinated attack. Cybercriminals performing DDoS attacks are liable to a penalty of up to 10 years’ imprisonment under the Computer Misuse Act 1990

Network security best practices

So far, we have looked at what network security threats are and how they can affect an organisation. Below are some security best practices and solutions designed for individuals  and companies safe from cyber attacks and in compliance with security regulatory bodies:

Network segmentation

A fundamental component of network security is partitioning a network into different sections based on its functional requirements. This segmentation uses subnets within the same network or creates VLANs, which function like entirely separate networks. 

Segmentation follows the principle of least privilege (PoLP) rulings and limits the potential impact of attacks to a single zone. Attackers who wish to gain access to other network zones must bypass security intersections at each network border. 

Email and web security

Pay attention to incoming, outgoing and internal web and email network traffic for any suspicious events. Follow secure hardening and configuration guidelines to ensure your assets are functioning as intended to identify, detect, respond and help in recovering in case of an incident. Regularly synthesise data from security software at your disposal to get a clear picture of what goes on within your network. 

Limiting direct Internet traffic to certain parts of your infrastructure, such as your servers, can reduce the entry points for attackers and give your security staff the chance to focus on other efforts.

Network security architecture 

Your network security architecture should be aimed at lessening security vulnerabilities within your environment. Ensure multi-tiered architecture is designed with security in mind just like defense in depth principle. Firewalls should be placed at the junction of all network areas, not just at the network perimeter. Use the built-in firewall functionality where possible to ensure protection at hosts/devices level. Implement anti-DDoS protections and related security controls at the network perimeter. Consider utilising host and network based intrusion detection systems (IDS) & intrusion detection systems (IPS).

Monitor and test security controls

Designing and deploying security controls is half winning the battle without knowing if they are doing the job they were meant for. This is where an independent third-party security services provider like Cyphere can assess and identify gaps in your controls. Controls validation offers not only weaknesses but also recommendations on risk remediation plans to help reduce your attack surface.

For network security controls assessment, the following are the suitable assessments:

  • Firewall security reviews
  • Network penetration testing aimed at external and internal infrastructure (active directory)
  • Network segregation testing 
  • Vulnerability assessments
  • Managed vulnerability scanning 

Get in touch to schedule your security assessments or discuss your security concerns.  



Table of Contents

BOOK A CALL