Penetration testers at a computer security firm were able to breach 92 percent of their corporate clients, with companies on average vulnerable via two vectors, the firm said.
London-based Positive Technologies said most companies were vulnerable to well-known security flaws that required no special skill to exploit, and that it was able to gain full control of every system that underwent internal penetration testing.
In internal tests, the firm was able to gain control of critical resources including industrial control systems, SWIFT transfers and ATM management.
The UK’s National Cyber Security Centre (NCSC) has repeatedly warned of the dangers posed by the hacking of the country’s critical infrastructure, including industrial control systems.
Positive’s clients included companies in the industrial, financial, and transport sectors, the firm said in its new Penetration Testing of Corporate Information Systems: Statistics and Findings report.
The failure to apply patches left many systems open to attack using well-known flaws, with Positive finding a 19-year-old flaw in one system – CVE-1999-0024, which affects the DNS server software BIND.
On the network perimeter, the most common issues were vulnerabilities in web application code, with 75 percent of successful penetration vectors leveraging poor protection of web resources.
At half of the companies tested an attacker was able to breach the network perimeter in just one step, usually by exploiting a web application vulnerability, Positive said.
The company said the issue was a result of the growing complexity of web applications, which makes coding errors more likely.
“These errors are frequently found during penetration testing, but by far the best way to find them is white-box testing with analysis of source code,” said Positive cyber security resilience lead Leigh-Anne Galloway in a statement. “Fixing vulnerabilities after the fact usually involves changing the code, which requires a lot of time.”
At 87 percent of tested clients, the firm’s Wi-Fi networks were accessible from outside the premises, such as from a nearby cafe, parking lot or public waiting area, exposing the internal network.
On 63 percent of systems, weak Wi-Fi security allowed resources on the local network to be accessed, including failure to encrypt Wi-Fi traffic or the use of weak Wi-Fi authentication protocols.
Other attacks included brute force attacks against the internal network and vulnerability to social engineering, Positive said.
The “vast majority” of tested companies were vulnerable via multiple vectors – two an average, and up to five.
Positive said many of the successful test attacks made use of the presence of interfaces at the perimeter that should not be accessible from the outside, such as an internet-accessible video surveillance system that provided an attacker with the ability not only to view videos, but also to run malicious code on the server.
“This shows how important it is to correctly delineate the network perimeter and monitor the security of every component,” Galloway said.
She recommended that companies minimise the number of services at the network perimeter and ensure that sensitive information such as access credentials and address books are not available publicly.
OpenAI chief operating officer Brad Lightcap to oversee international expansion as company consolidates lead in…
Chinese researchers publish details on device that could wreak havoc on undersea communications cables in…
Former Intel chief Gelsinger expands role at Gloo, becoming executive chairman and head of technology…
MEPs add to Commission pressure for second EU Chips Act amidst industry calls for renewed…
Smartphone maker Xiaomi reportedly raises about $5.5bn in Hong Kong share sale as it invests…
BYD's Qin L EV sedan starts at about half the price of Tesla's Model 3,…