The Evolution of Endpoint Security Demands Detection and Response

The Evolution of Endpoint Security Demands Detection and Response

Legacy endpoint prevention and protection solutions are limited when faced with advanced and sophisticated threats

With more than 832 million malware samples roaming the internet, organizations are at constant risk of being targeted and affected. While the sheer number of threats is something to be wary of, malware complexity and stealth has also increased exponentially over the past couple of years.

Security experts agree, 99 percent of all malware can be spotted by endpoint security solutions and technologies, and it’s usually the last 1 percent making headlines as being responsible for data breaches, data exfiltration, and covert cyber espionage operations.

What Endpoint Security Does

Traditional endpoint security solutions are designed to ensure multi-layered protection against garden-variety threats, malware, and fraudulent websites that might extort both the user’s privacy and data. From a technology point of view, this involves monitoring processes to ascertain when applications start behaving badly or when they’re trying to inject into other processes.

For example, some malware tries to inject code into legitimate processes, such as explorer.exe, to execute malicious code with the privileges of that process. Since this is a malicious attempt, a security solution will immediately terminate this action and potentially revert any changes committed by the malicious process on the legitimate one.

When monitoring processes, endpoint security solutions typically provide a score for each process based on an assessment of whether each action performed is malicious or harmless. If the sum total of some actions performed by the same process exceeds a certain threshold, the application will be terminated and all performed actions will be severed. While this is just one example of process-monitoring security technology that constantly monitors the behavior of running applications, modern endpoint security solutions can also be relied on to go one step further and employ several layers of security that are usually augmented by machine learning algorithms.

What Endpoint Security Doesn’t Address

The reality is that while most security technologies are great at defending endpoints against malware and software-based threats, they are often limited when faced with advanced and sophisticated threats (APTs) that are specifically targeted at an individual organization or an employee of that organization.

Advanced and persistent malware is commonly built to evade detection by traditional security solutions. Cybercriminals generally perform a long surveillance program of their victims in order to find out everything they can about the victim’s network configuration, policies, security access, and even internally deployed security solutions. With this insight in hand, attackers can readily develop a threat or piece of malware that’s specifically created for that target, sporting sufficient infiltration and evasion capabilities that fly below the radar of traditional security solutions.

Traditional endpoint solutions also struggle with fileless malware attacks. This is because instead of installing software on a victim’s machine, fileless attacks hijack tools built into Windows to infiltrate a network or system—in short, turning the OS on itself. Consider for example, PowerShell scripts. They are usually legitimate processes to allow IT admins to automate tasks on endpoints. However, they are also abused by threat actors because they use a native Windows tool.

While fileless malware has been typically associated with state-sponsored actors, the low barrier to entry makes it extremely easy for threat actors to use it to deploy seemingly benign payloads, such as cryptocurrency miners. In fact, the Bitdefender Global Mid-Year Cybersecurity Landscape Report shows that fileless malware has been significantly used in conjunction with ransomware and cryptocurrency miners, because it offers a stealth alternative to deploying financially profitable malware.

Fileless malware, combined with the advent of the use of zero-day vulnerabilities in popular software and applications, enables threat actors to fly under the radar of traditional endpoint security. These methods allow attackers to plant various threats, malware, and persistency tools designed to increase their foothold on the compromised device. In a growing and unnerving trend, they also move laterally across the entire IT infrastructure.

Visibility is Key for Detection and Response

While endpoint security is not equipped to detect if user credentials are being misused by threat actors to log into the infrastructure, EDR tools will immediately flag these actions – credentials misuse and data exfiltration – as they demonstrate signs of abnormal behavior that are usually attributed to threat actors and potential data breaches. For example, because of phishing, employees may reveal their credentials, enabling threat actors to breach the infrastructure without deploying malware or any type of advanced threats. From that point onward, attackers can access and copy internal documents and data, and even install additional persistency tools that enable them with full control over the targeted endpoint. Since the EDR solutions are capable of monitoring and logging any action performed on endpoints – while the security solution is only focused on detecting malware – it’s capable of flagging user logins during off hours and report them to IT and security teams for investigation.

While advanced threats are characterized by stealth; it does not mean they are completely invisible. Their actions leave behind traces that although traditional endpoint security solutions don’t tag as suspicious, endpoint detection and response (EDR) tools will automatically detect them and issue warnings to IT and security teams.

EDR is also a powerful post-investigation tool for when companies experience a data breach and are required by law to perform timely reports on how the breach occurred. EDR can help IT and security teams follow the chain of events back in time, to the original infection vector that led to the data breach, and eventually plug it by monitoring and logging security events happening on endpoints. Everything from user logins to software updates to executed files are logged and reported in the centralized management console so that the IT and security team can have a complete picture of actions performed by end users.

Next Generation EDR

While the power of EDR is visibility, without prioritization of incidents, it can become a burden if every security warning is treated as a potential security breach. The effectiveness of EDR is lost if IT and security teams are constantly checking security alerts without having the ability to perform triage to determine what’s critical. Moreover, the risk becomes “alert fatigue,” where staffs are so overwhelmed by the volume of alerts that they limit their focus to just address what’s perceived as the biggest problems. What appears to be smaller issues could in fact be something that is easily addressed and stops the potential spread of growing threats.

For the forward-thinking enterprise, the key is to leverage both EDR and endpoint prevention and protection. However, from an IT and security perspective, while both solutions are designed to secure workloads and spot potential security anomalies, they’re disparate in terms of management and visibility. This means that having both installed on an endpoint will also cause what the industry refers to as “agent fatigue.” The more disparate agents present on an endpoint, the bigger the performance impact on the machine and the bigger the management effort for the IT and security teams.

Next generation EDR marries endpoint prevention and detection and response. These EDR solutions also have the ability to perform triage on security events. Machine learning is a key component in achieving this as it can be trained to only warn security and IT teams when potentially dangerous security events are detected. Organizations with complex infrastructures must look to deploy an integrated platform that addresses both active security incidents and potential security incidents, IT and security teams can save time and ensure a complete overview of the security posture of the organization’s infrastructure.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3