Hackers are targeting unpatched VPNs (virtual private networks), work-at-home staff and remote employees amid coronavirus workforce shifts, the Department of Homeland Security's (DHS) Cybersecurity & Infrastructure Security Agency (CISA) has warned in an alert.
“As organizations elect to implement telework, CISA encourages organizations to adopt a heightened state of cybersecurity,” the advisory reads. Organizations using virtual private networks (VPN) for telework must be aware that hackers are searching for and targeting vulnerabilities, the alert said. “As VPNs are 24/7, organizations are less likely to keep them updated with the latest security updates and patches.”
CISA's alert urges teleworkers to be aware that malicious cyber actors may increase phishing emails to steal their usernames and passwords. It also warns that organizations not using multi-factor authentication (MFA) for remote access are more susceptible to phishing attacks. In addition, CISA points out that organizations may have a limited number of VPN connections and beyond that must not allow other employees to telework. "With decreased availability, critical business operations may suffer, including IT security personnel’s ability to perform cybersecurity tasks," the alert said.
“There are nation-states that are actively taking advantage of the situation, particularly our Cold War adversaries, and we need to be keenly aware that they are aware of the lack of security that is presented by everyone telecommuting,” Tom Kellermann, who heads VMware Carbon Black’s cybersecurity strategy, told The Hill. “There has been an uptick of targeted attacks against executives in conjunction with this pandemic,” he said. “When it comes to home security you are assuming your work laptop is secure, but you need to take steps on your own end.”
CISA is urging organizations to implement the following six recommendations if considering telework options:
Security provider Check Point also offered five best practices for organizations’ telework force. “This guide should serve as a starting point for organizations whether their apps and data are stored in data centers, public clouds or within SaaS applications,” the security specialist wrote in a blog post.