[2023] Case Studies and Countermeasures for Damages Caused by Insufficient Endpoint Security

Case Studies and Countermeasures for Damages Caused by Insufficient Endpoint Security

Cyber attacks on companies, including small and medium-sized enterprises, are increasing. Some security personnel may be struggling to understand the overview and necessity of endpoint security.

This article explains why endpoint security is gaining attention and provides case studies of damages caused by insufficient countermeasures.

It also touches on countermeasures, so by the time you finish reading, you should have a clear idea of where to start.

Table of Contents

  1. What is Endpoint Security?
  2. Why is Endpoint Security Gaining Attention?
    1. Increase in Unauthorized Access
    2. Information Leaks Inside and Outside the Company
    3. Increase in Telework Due to Work Style Reforms
  3. Case Studies of Damages Caused by Insufficient Endpoint Security Measures
    1. Damage from Supply Chain
    2. Information Leaks Due to Internal Fraud
    3. Attacks Targeting New Normal Work Styles such as Telework
  4. 3 Endpoint Security Measures
    1. Preventing Malware Damage
    2. Preventing Personal Information Leaks
    3. Preventing the Outflow of Internal Information
  5. Summary

1. What is Endpoint Security?

Endpoint security refers to security measures for devices such as PCs, smartphones, and tablets. Since “endpoint” means “terminal,” in security terminology, it refers to the terminal devices connected to network devices.

The purpose is to prevent malware intrusion, unauthorized access, and information leaks due to cyber attacks on devices connected to the network.

As the threat of cyber attacks increases, rapid responses are required through endpoint security, such as quickly detecting and blocking threats that occur.

Click here for more details on Endpoint Security!

2. Why is Endpoint Security Gaining Attention?

The reasons why endpoint security is gaining attention are the “increase in unauthorized access,” “information leaks inside and outside the company,” and “increase in telework due to work style reforms.” Let’s check what kind of threats exist in each.

2-1. Increase in Unauthorized Access

According to the Ministry of Internal Affairs and Communications’ announcement, “Occurrence Status of Unauthorized Access Activities,” the number of recognitions and arrests of unauthorized access activities reported to the National Police Agency by prefectural police in 2020 was 2,806. This is an increase of approximately 1,400 cases compared to 1,486 cases in 2018.

Of the 2,806 cases related to unauthorized access in 2020, 2,703 cases were detected in general companies, accounting for approximately 96% of the total. From these results, it is noted that general companies should strengthen endpoint security measures.

2-2. Information Leaks Inside and Outside the Company

According to a survey conducted by a research company, Tokyo Shoko Research, in 2022, 150 listed companies and their subsidiaries disclosed personal information leaks and loss incidents, with 165 incidents and approximately 5.92 million leaked personal information.

The number of companies and incidents has been updated for the second consecutive year since the start of the survey in 2012.

The breakdown of the 165 incidents is 91 cases (approximately 55.1%) due to “virus infection/unauthorized access,” followed by 43 cases (26%) due to “misdisplay/mistransmission,” with human-caused reasons such as email addressing errors being ranked high.

It was found that information leaks often occur not only from virus infections such as malware caused by emails from outside the company, but also from human errors within the company. Therefore, endpoint security that can prevent information leaks is gaining attention.

2-3. Increase in Telework Due to Work Style Reforms

According to the Ministry of Internal Affairs and Communications’ “Results of the 2021 Survey on Usage Trends in Communications,” the percentage of companies that have introduced telework was over approximately 52% in 2021, indicating that more than half of the companies have introduced it.

If there are vulnerabilities in the home communication environment for teleworking from home, there is a risk that the terminal for telework may be infected with a virus, or that the infected terminal may be used to gain unauthorized access to the company’s internal system. Endpoint security is gaining attention as a measure against virus infection due to the increase in telework.

3. Case Studies of Damages Caused by Insufficient Endpoint Security Measures

From here, we will explain the cases where companies have suffered damage because they have not taken measures against the threats mentioned above. We will also touch on the causes of security incidents and recurrence prevention measures, so please check if your company is in a similar situation.

3-1. Damage from Supply Chain

Company Kojima Press Industrial
Cause Vulnerabilities in remote connection devices used by subsidiaries independently for dedicated communication with specific external companies
Case Details A subsidiary of Kojima Press Industrial had vulnerabilities in remote connection devices used independently for dedicated communication with specific external companies, which led to unauthorized access. The attacker intruded into the subsidiary’s network from the remote connection device and further intruded into Kojima Press Industrial’s internal network. Traces of attacks on servers and PC terminals were discovered after 20:00 on February 26, 2022. This cyber attack was caused by “ransomware” that restricts access to the system and demands ransom, and data was encrypted on some of the servers and PC terminals.
Impact Toyota’s domestic 14 factories 28 lines were stopped
Recurrence Prevention Measures With the support of external experts, strengthen prevention of unauthorized access to networks, servers, and PC terminals, and expand and strengthen monitoring.
Reference System Failure Investigation Report (1st Report).pdf

3-2. Information Leaks Due to Internal Fraud

Company J.S.B. Co., Ltd.
Cause An employee logged into the customer management system by an unauthorized method, extracted contract information of the property, and took the data outside.
Case Details From around January 10, 2023 (Tuesday), 33 inquiries were received by our company, such as solicitations regarding water servers, electricity, and the Internet, impersonating our company’s brand, by a third party who is completely unrelated to our company, and we started a direct investigation to the vendor that seemed to be the source of the solicitation, including grasping the situation. As a result of an internal investigation on January 20, 2023 (Friday), it was found that there was a high possibility that our employee extracted customer information by an unauthorized method and leaked it outside. On January 23, 2023 (Monday), a countermeasure headquarters was established for this matter, and an internal investigation was conducted with the cooperation of external experts to grasp the whole picture. On January 27, 2023 (Friday) evening, a fact confirmation was conducted with the employee suspected of leaking the information, with the cooperation of external experts. He admitted the fact that he extracted customer information by an unauthorized method and leaked it to a third party.
Impact Leakage of approximately 29,000 customer information
Recurrence Prevention Measures We will implement security enhancements such as restricting the use of some functions of the customer management system for the entire company. In the future, we will review the security of the system and further strengthen security measures. In addition, we will thoroughly inform the company about the rules regarding information management again, and continuously conduct education on personal information protection.
Reference https://www.nikkei.com/nkd/disclosure/tdnr/20230202598968/

3-3. Attacks Targeting New Normal Work Styles such as Telework

Company Fortinet (USA)
Cause Vulnerability of VPN equipment
Case Details It was found by September 13, 2021 that the authentication information of tens of thousands of companies using “VPN (Virtual Private Network)” equipment manufactured by Fortinet, an American company used for telework around the world, had been leaked. About 1,000 Japanese companies are included, many of which are considered to be small and medium-sized enterprises. If left unattended, hackers may intrude and steal information. The company has acknowledged the leak and is calling for measures such as changing passwords.
Impact Information of 87,000 units leaked
Countermeasures If customer organizations were running affected versions, Fortinet recommends taking the following steps immediately to prevent customer credentials from being exploited:

  1. Disable all VPNs (SSL-VPN or IPSEC) until the following remediation steps are implemented.
  2. Upgrade affected devices to the latest available release immediately, as shown below.
  3. Treat all credentials as potentially compromised and perform a password reset across the organization.
  4. Implement multi-factor authentication to prevent the exploitation of leaked credentials now and in the future.
  5. Notify users of the reason for the password reset and monitor services such as HIBP on a domain-by-domain basis.
Reference https://www.fortinet.com/jp/blog/psirt-blogs/malicious-actor-discloses-fortigate-ssl-vpn-credentials https://www.nikkei.com/article/DGXZQOUE110A80R10C21A9000000/

4. 3 Endpoint Security Measures

Some of you who have read this far may be worried that “I should take endpoint security measures, but I don’t know what to do.”

When taking these measures, specialized knowledge about security and organizational response are required. However, you often do not have the knowledge or the physical strength to move the entire organization.

From here, we will explain the features of security software that allows you to take measures even if you are not familiar with endpoint security. Some software can be installed at a low cost, so please refer to it.

If you want to know about security software products, please refer to here.

4-1. Preventing Malware Damage

Check if the endpoint security software has a malware prevention function. The malware prevention function is a function that prevents the inflow of viruses and malware by monitoring the system.

Some software products perform real-time virus scans or automatically scan when a USB is connected. Since you do not know when or at what timing you will be infected with a virus, it can be said that the function to perform real-time inspection is convenient.

4-2. Preventing Personal Information Leaks

Having a personal information leak prevention function can reduce the risk of your company from the perspective of complying with the Personal Information Protection Act. The personal information leak prevention function is a function that detects and encrypts unencrypted personal information and confidential data.

It can be said that it is convenient to detect and encrypt confidential data that you are unaware of and leave unattended. Depending on the software, you can set the company’s security policy, so you can customize it according to your company’s security level.

4-3. Preventing the Outflow of Internal Information

If personal information or customer information stored in files managed by the company is taken out, it may affect not only your company but also customers.

Choose a product that has a function to prevent taking out files that store personal information and customer information. For example, a product that has a function that prevents confidential files from being taken out to external hard disks or USBs.

In addition, it is convenient to have a function that blocks the execution of unnecessary applications that are not related to work. You can prevent confidential files from being taken out to the outside through applications.

Summary

This article has explained the overview of endpoint security, the reasons why it is gaining attention, and the damage cases of companies that neglected security measures.

The reason why endpoint security is gaining attention is that unauthorized access targeting the vulnerability of the home communication environment and information leakage to the outside by employees are increasing with the increase in telework, including work style reforms.

Taking these measures individually will require specialized knowledge about security and organizational efforts. Therefore, why not consider introducing endpoint security software that can easily take all of these measures?

Click here for EXO Security pricing

Contact: globalsupport@jiran.com

Share posts