Rising threat of SMB vulnerabilities and their effect on business continuity

“85% of MSPs report attack against SMBs in the last two years” read a report title few months ago

“Average cost of downtime due to SMB vulnerabilities attacks was $1,41,000 “ was a fact from the same report.

These two headlines paint a gray picture of how SMB is under persistent threat from attackers all over the globe.  Maybe because of a lot of 0-days and public exploits targeting SMBs are easily available or due to the widespread usage of SMB, hackers have found their Goldmine!

A simple ‘smb’ search on Shodan.io returns more than 1.5 million results. This is enough to assume how largely and globally this protocol is used. Needless to say, what’s more prevalent is what’s more targeted.

Just recently arrived SMBleed vulnerability quickly gained momentum for it can result in Remote Code Execution (RCE) on SMB 1.1 under certain circumstances and when combined with a previously reported SMBGhost vulnerability. The issue lay in the Srv2DecompressData function in the srv2.sys SMB server driver. Considering the grave situation of more than a million active usages of SMB, Microsoft released a patch, but will that be enough?

Considering a best practice of installing security patches as soon as they arrive, we observe security misconfigurations where developers are adamant to update to latest versions owing to instability, added work or sometimes even negligence. This creates a perfect opportunity for hacker to infiltrate the systems and compromise the data or install ransomware.

Coming to Ransomwares, Wannacry or Eternal Blue wreaked havoc in the industry and this is not hidden from anyone. But very few are aware of the damages that other ransomwares are making by leveraging the SMB protocol. Four out of five MSPs are stating that they are increasingly targeted by Ransomwares and 89% are concerned about this increasing threats. The hackers have found various ways which even include social engineering attacks to intrude into the organizations and install ransomwares. The options left at that point are quite a few since not all ransomwares can be decrypted and there is always a possibility of data loss even after data is decrypted.

The best solution is always to go for preventing these attacks and investing on business saving instead of business recovery from such attacks

We at Detox, suggest the following practices in general to follow to avoid attacks through SMB. Definitely, this is not an exhaustive list since not curated for a specific business. These are generic but quite effective.

  • Do not open the SMB ports for public until extremely necessary (Even with the latest version)
  • Install the SMB security updates as soon as they arrive.
  • Train your staff to be phishing-resistant (Phishing is the leading cause of Malware)
  • Never leave SMB with easily guessable or weak passwords
  • Enable 2FA on email clients to reduce the risk of compromised accounts
  • Continuous Logging and monitoring is required to flag any anomaly
  • Have a cyber liability insurance to get covered for the losses (if happen)
  • Have a complete security testing, VAPT audit of all the infrastructure to prevent such attacks

We responsibly and through experience suggest that coping with a compromised system should be the last resort since what has been done cannot be undone. Also, most organizations take years to recover from a single hack, sometimes Never!
So, do consult experts when planning the security architecture and conduct routine security audits & pentests because as they say, Security is not an implementation, it is a process.

Detox Author

Recent Posts

Understanding the Latest Tactics of Ransomware Attacks: How to Protect Your Business and Data

Ransomware attacks have emerged as one of the most challenging cybersecurity threats facing businesses today. With attackers constantly evolving their…

2 years ago

Exploring the Top Vulnerability Scanning Tools for Effective Security

In the realm of Cybersecurity, vulnerability scanning tools play a pivotal role in identifying and addressing potential weaknesses within an…

2 years ago

How Dark Web Monitoring Fits Into Your Cybersecurity Solutions

Dark web monitoring serves as a critical component within the broader spectrum of cybersecurity solutions, playing a proactive role in…

2 years ago

Cracking the Code: Mobile App Security Risks Revealed!

In the fast-paced digital landscape of today, mobile applications have become an integral part of our lives. From social networking…

2 years ago

Exploring the Common Pitfalls of OWASP Penetration Testing

In the ever-evolving landscape of cybersecurity, penetration testing plays a crucial role in identifying vulnerabilities within an organization's systems and…

2 years ago

Best Practices for Maintaining Security After VAPT of Web Applications

Understanding VAPT (Vulnerability Assessment and Penetration Testing) Vulnerability Assessment and Penetration Testing (VAPT) is a proactive approach to security evaluation.…

2 years ago