Jason Haddix, former CISO of Ubisoft, shared tremendous lessons-learned from his own experience and those of his network hit by #Lapsus$ at Microsoft's #BlueHat conference.
These attackers focused on creds and cookies sold on the dark web on sites such as Genesis, then purposely avoided EDR by targeting web-based apps such as Slack and Confluence. They bypassed authentication controls with the end goal of VPN access.
Lessons learned:
- Add mitigation controls for stolen creds and cookies including shortening session length, monitoring dark market sales, and adding a bug bounty for leaked creds.
- Add a team for secrets management: "You definitely have hard-coded creds somewhere in your network."
- Additional authentication controls such as tighter impossible travel settings and maps showing geographic location of login requests
- Set up jump hosts and network segmentation to access infrastructure and security products