19/02/2025 3m read

Highlights aus dem Cato CTRL SASE Threat Report für Q3 2024 

Etay Maor
Etay Maor
Cato CTRL SASE Threat Report-blog

Inhaltsverzeichnis

Introduction  

Today, we published the Q3 2024 Cato CTRL SASE Threat Report, which summarizes findings from Cato CTRL’s analysis of 1.46 trillion network flows across more than 2,500 customers globally between July and September 2024.  

Key Findings 

Threat actors recruiting pen testers for ransomware affiliate programs  

In closely monitoring discussions on the RAMP forum, Cato CTRL has observed threat actors seeking pen testers to join various ransomware affiliate programs including Apos, Lynx and Rabbit Hole.   

Any good developer knows that software needs to be tested before deploying in production environments. This is also true for ransomware gangs. They want to ensure that their ransomware can be deployed successfully against organizations.   

Shadow AI lurks in the background for organizations  

Shadow AI refers to the unauthorized or unsanctioned use of AI applications and tools within an organization without the knowledge or approval of IT departments or security teams. This phenomenon typically involves employees or departments adopting AI solutions independently and bypassing formal vetting processes and governance controls.  

Out of the hundreds of AI applications that Cato CTRL monitors, Cato CTRL tracked 10 AI applications used by organizations (Bodygram, Craiyon, Otter.ai, Writesonic, Poe, HIX.AI, Fireflies.ai, PeekYou, Character.AI and Luma AI) and observed various security risks. The top concern is data privacy.   

Q3 2024 Cato CTRL SASE Threat Report | Download the report

TLS attack attempts reveal TLS inspection not utilized enough 

TLS inspection allows organizations to decrypt, inspect and re-encrypt traffic. However, TLS inspection can break applications and access to some domains. As such, many organizations choose to forgo TLS inspection entirely or bypass inspection for a large portion of their traffic.   

Cato CTRL found that only 45% of participating organizations enable TLS inspection. Even then, only 3% of organizations inspected all relevant TLS-encrypted sessions. This leaves the door open for threat actors to utilize TLS traffic and remain undetected. Organizations must inspect TLS sessions to protect themselves. In Q3 2024, Cato CTRL found that 60% of attempts to exploit CVEs were blocked in TLS traffic. CVEs included Log4j, SolarWinds and ConnectWise.    

When TLS inspection is enabled, organizations are better protected. In Q3 2024, Cato CTRL found that organizations who enabled TLS inspection blocked 52% more malicious traffic than organizations without TLS inspection. 

Security Best Practices 

Based on our key findings, Cato CTRL recommends that organizations take the following actions: 

  • Ransomware: Organizations should engage in red team exercises and pen testing to identify vulnerabilities in their infrastructure before ransomware gangs exploit them. 
  • Shadow AI: Visibility into which AI tools and applications are being used, by whom and for what purposes is important for organizations to effectively manage data privacy risks. 
  • TLS Inspection: Threat actors often use encrypted communication channels to evade detection and exploit vulnerabilities in applications that utilize TLS. Enabling TLS inspection is crucial for effectively monitoring this traffic. 

Resources 

Related Topics

Etay Maor

Etay Maor

Etay Maor ist Chief Security Strategist bei Cato Networks, Gründungsmitglied von Cato CTRL und ein branchenweit anerkannter Cybersicherheitsforscher. Bevor er 2021 zu Cato kam, war Etay Chief Security Officer bei IntSights, wo er die strategische Cybersicherheitsforschung leitete. Etay hatte außerdem leitende Sicherheitspositionen bei IBM inne, sowie bei den Cyber ​​Threats Research Labs von RSA Security, wo er Malware-Forschungs- und Aufklärungsteams leitete. Etay ist außerordentlicher Professor am Boston College und Mitglied der Call for Paper (CFP)-Komitees für die RSA-Konferenz und die QuBits-Konferenz. Er hat einen BA in Informatik und einen MA in Terrorismusbekämpfung und Cyber-Terrorismus.

Read More

Cato Networks
13x anerkannt
von Gartner

Gartner Market Guide zu Managed SD-WAN-Services

Gartner Hype Cycle zu mittelständischen Unternehmen, 2021

Gartner Market Guide zu virtuellen privaten Netzwerken

Gartner Hype Cycle for Threat-Facing Technologies, 2019

Gartner Market Guide zu Zero-Trust-Netzwerkzugriff

Gartner Hype Cycle zu Edge Computing, 2021

Hype Cycle for Business Continuity Management and IT Resilience, 2021

Gartner Hype Cycle zu Netzwerksicherheit, 2021

Gartner Hype Cycle zu Unternehmensnetzwerken, 2021

Gartner Hype Cycle zu digitalen Arbeitsplatzlösungen, 2021

Gartner Hype Cycle zu Cloudsicherheit, 2021

Gartner Hype Cycle for Cloud Computing, 2021

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose