A worrying number of environments are vulnerable to complete takeover via escalated privileges, a new report from Picus Security has found.

Environments were tested in simulated attacks, with the average organization managing to defend against 7 out of 10 attacks, but considering the constant threat presented by organized cybercrime groups, this leaves a serious margin for potential intrusion.

Out of all the attacks simulated, over half (56%) were logged by firewalls, while just 12% triggered an alert.

macOS is putting organizations at risk

Full environment takeovers occur when an attacker can escalate their privileges to an administrator level, giving them access to move throughout systems and networks to steal data, install malware and much more.

When it comes to which operating systems were most successful at keeping out simulated attacks, Linux took the gold keeping out 65%, shortly followed by Windows at 62%, with macOS keeping out just 23% of attempted attacks.

“While we have found Macs are less vulnerable to start, the reality today is that security teams are not putting adequate resources into securing macOS systems,” said Volkan Ertürk, Picus Security Co-Founder and CTO. 

“Our recent Blue Report research shows that security teams need to validate their macOS systems to surface configuration issues. Threat repositories, like the Picus Threat Library, are armed with the latest and most prominent macOS specific threats to help organizations streamline their validation and mitigation efforts,” Ertürk concluded.

Many environments were also at risk from a lack of best practices, with 25% of companies using common language passwords which can easily be brute forced or decrypted into cleartext credentials. Moreover, just 9% of data exfiltration techniques were prevented by the tested organizations, with BlackByte being the most challenging group for organizations to defend against (17%), followed by BabLock (20%) and Hive (30%).

“Like a cascade of falling dominoes that starts with a single push, small gaps in cybersecurity can lead to big breaches,” said Dr. Suleyman Ozarslan, Picus co-founder and VP of Picus Labs.

“It’s clear that organizations are still experiencing challenges when it comes to threat exposure management and balancing priorities. Small gaps that lead to attackers obtaining domain admin access are not isolated incidents, they are widespread. Last year, the attack on MGM used domain admin privileges and super admin accounts. It stopped slot machines, shut down virtually all systems, and blocked a multi-billion-dollar company from doing business for days,” Ozarslan said.

More from TechRadar Pro

Services MarketplaceListings, Bookings & Reviews

Entertainment blogs & Forums