DATA EXFILTRATION - WHAT IS IT?



Data exfiltration is a data breach that involves the unauthorized copying or transferring of data from one device to another. Cyber criminals can use either automated or manual malware attacks to exfiltration data from individuals or companies (Magnusson, 2023). Even if the user has proper permissions, any removal of data is considered exfiltration but the traditional definition classifies data extrusion tactics as intentional data theft performed by people with malicious intent. The problem with data exfiltration is that it puts the organizations reputation at risk. If company data is compromised (intentionally or unintentionally) can put sensitive company information, employee data, customer data, or confidential documents at risk (Magnusson, 2023).

There are several different ways cyber criminals’ compromise data:

1.      Unsanctioned cloud storage accounts – Because cloud storage makes transferring data as simple as dragging and dropping files into a folder in the cloud, it also makes it a prime tool for data extrusion (Strickland, 2022). This threat can be mitigated by using URL (web) filtering to help restrict access from unsanctioned cloud storage providers. These filtering tools are regularly updated with new websites as they emerge, making it very easy to block these new threats.

2.      Portable storage devices (USB, cell phones, etc.) – USB drives, databases, and cloud applications are the top three vectors being used to exfiltrate data (Strickland, 2022). These devices are able to store terabytes of data onto a tiny, portable device. To help thwart this type of exfiltration, organizations can block USB ports but that also prevents legitimate USB drives in the process. Software exists that allows the transfer of files based on specific file names and extensions (Strickland, 2022).

3.      Email and phishing – Email is the top exfiltration risk and it’s easy to understand why. The simple act of an employee mailing company data to a personal email account is easy and seems to have little risk. The risk comes if there is an insider threat (employee intending to do harm), a simple misaddressed email, or unknowingly including customer data (Strickland, 2022). Fortunately, organizations can protect against this threat by configuring network email filtering to detect these types of emails and restrict unauthorized attachments outside of the organization. They can also implement important data security policies in the organization, provide security awareness training to employees, and block access to unauthorized email platforms (Strickland, 2022).

4.      Unsecured servers – Any misconfigured server operating on a business network where sensitive data is kept exposes the company to data theft and may be compromised by cyber criminals with bad intentions such as identity theft, blackmail, or financial fraud (FBI, n.d.). The good news is that most vulnerabilities behind unsecured servers can be mitigated by never making the server public-facing unless absolutely necessary, use multi-factor authentication (MFA) to protect from brute force attacks, limit access to the server by using a firewall to limit unauthorized traffic, keep the physical server areas secure for unauthorized access, on the network separate database servers from non-database servers, and finally, ensure data encryption id used (Strickland, 2022).

5.      Social media forums – The most common websites used for data exfiltration are: file sharing sites, instant messaging, social media, forums, and email. Firewalls can be configured to deny access to any unknown website from inside the organization, or to block against specific sites and types of sites can be used to help mitigate this vulnerability (Strickland, 2022).

6.      Malware - Most external threats use combination of phishing and malware to gain unauthorized access to a targeted system. Fortunately there are a number of antimalware solutions available to help stop intruders from unauthorized, remote access attempts (Strickland, 2022).

7.      Printers – Between 2020-2021 68% of businesses in the US and Europe suffered a print related data breach which caused a loss of more than $400,000 (Strickland, 2022). Made easier with remote work, connecting a printer to a company computer and printing sensitive documents is one of the easier ways to exfiltrate data. Fortunately there are a number of ways to protect against this as well: encrypt internal printer storage drives, enforce secure printing (requiring a user to enter a unique PIN to retrieve sensitive data), securely store and dispose of sensitive documents, monitor printer logs for sensitive files, force employees to immediately retrieve printed documents, and use USB blocking to block high risk users from connecting printers to their computers (Strickland, 2022).

 

References

Magnusson, A. (2023, January 5). What is data exfiltration? (and the best way to prevent it). StrongDM. Retrieved May 2, 2023, from https://www.strongdm.com/blog/data-exfiltration

Strickland, D. (2022, December 29). Top 7 data exfiltration risks [data theft prevention tips]. CurrentWare. Retrieved May 2, 2023, from https://www.currentware.com/blog/top-data-exfiltration-risks/

 




Comments