<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

All Posts

Behavioral Indicators of Insider Threat Activity

Behavioral Indicators of Insider Threat Activity

Contrary to popular beliefs, an insider threat is not always a security risk within an organization's immediate perimeter. Current employees and managers aside, an insider threat could be a former employee who had access to specific information, a third-party consultant, or a business partner.

In any case, malicious insiders account for about 38 percent of cyber breaches worldwide between 2012 and 2017, according to statistical reports.

 

Root Causes of Insider Threats Worldwide

Insider_Threat_CausesSource: Statista

Malicious and cooperative insiders, combined with negligence, are at the core of 81 percent of all data breaches cases during the period, which makes insider threats the top cause of cybersecurity breaches across organizations of all sizes and all industry verticals.

Industry research shows that close to 20 percent of all employees have access to all sensitive data within an organization, which means anyone who knows how an organization's network resources and IT ecosystem works is a potential insider threat. It is even more true for individuals who have, or had, access to sensitive corporate data and know where it resides and what data protection is in place.

The average overall cost of a cybersecurity breach due to an insider threat stands at $11.45 million, according to the Cost of Insider Threats 2020 report by IBM. Thus, insider threats and ransomware emerge as one of the most severe cyber threats organizations face on a global scale.

While preventing insiders from siphoning out sensitive information is a very demanding challenge, there are methods to mitigate the risks associated with malicious and cooperative insiders and detect suspicious or abnormal behavior that indicates an insider may be attacking an organization's business-critical systems and sensitive data.

 

Groups and Types of Insider Threats

We should highlight that an overwhelming 62 percent of insider threats are related to data exfiltration, followed by misuse of access privileges with 19 percent. Thus, insider threats are mostly about accessing data and systems and then siphoning out the respective databases or sensitive files.

 

Most Common Types of Insider Threats

Types_Insider_Threat_USA_2020

There are two major types of insider threats at the top-level: intentional or malicious insiders and unintentional ones. Unintentional insider threats are generally categorized as 'Pawns' while malicious insiders are 'Turncloaks.' We can further categorize those two types into at least four individual categories of insider threats:

 

Pawn

Any employee can turn into a pawn by clicking on a malicious link in a corporate email or making another mistake that enables a bad actor to penetrate the organization's perimeter. Other pawns are victims of advanced hacking tactics that involve social engineering to trick a person into visiting a malicious website or sharing credentials with a bad actor.

 

Turncloak

Any insider who is stealing data or securing access to systems for a third party is a turncloak. A turncloak has legitimate access to corporate networks, data storage systems, endpoints, and cloud-based systems.

 

Goof

Goofs are not exactly malicious insiders but do not follow the security rules and policies, resulting in more significant cybersecurity risks. Employees trying to bypass the established procedures for access to data or connected systems fall into this category, and they are the main insider threat risk, with over half of all insider threat incidents occurring due to negligence or ignorant behavior by in-house users.

 

Collaborator

As opposed to a goof, a collaborator is a malicious insider who intentionally steals data or sabotages an organization's operations. Most insider threat collaborators work in cooperation with or under the influence of competitors or nation-state actors, looking for sensitive data and access to critical business systems.

 

Lone Wolf

A lone wolf performs his malicious work without being in collaboration with any third party. The lone wolf deliberately steals information or sabotages its operations without being manipulated or otherwise forced by a third party.

 

Whatever the root cause for such a malicious behavior might be, organizations can look for insider threat behavior patterns and clear signs that a user is acting as a harmful insider.

 

How to Detect Insider Threat Behavior

Indicators of possible insider threat activity fail into two categories: digital warning signs and behavioral abnormalities.

Digital Warning Indicators:

  • Downloading or accessing substantial amounts of data
  • Accessing sensitive data that they do not need to perform their core job
  • Starting to access data that they have never accessed before
  • Requesting access to resources not needed for their primary job function
  • Using unauthorized storage devices such as flash memory, USB sticks, etc
  • Browsing the corporate network in search of sensitive data
  • Copying files containing sensitive data frequently
  • Transferring sensitive data outside the organization by email or another communications channel

 

Behavioral Warning Indicators:

  • Trying to bypass any security measures in place
  • Working extra hours very often and thus staying in the office during off-hours
  • Accessing networked resources while on vacation, sick leave, or on holidays
  • Extreme interest in subjects and projects outside of the scope of their job position and function
  • Displaying any vulnerabilities that could be exploited by bad actors: drug or alcohol addictions, financial troubles, unpredictable behavior at the workplace

 

Digital warning signs are far more reliable when analyzing insider threat risks and detecting abnormal behavior. Nonetheless, managers can consider behavior prediction theories to help an organization detect insider threats at an early stage.

 

Behavior Prediction Theories

  • General Deterrence Theory: A person commits a crime when benefits offset action costs
  • Social Bond Theory: A person commits a crime if there are no solid social bonds of attachment, commitment, involvement, and belief
  • Social Learning Theory: A person commits a crime if he/she binds with malicious peers
  • Theory of Planned Behavior: Predicting a person's malicious behavior is based on assessing attitude, subjective norms, and perceived behavior control towards crime
  • Situational Crime Prevention: Malicious can occur whenever a motive and opportunity are in place

 

None of these theories is a silver bullet to detect insider threats, but a combination of practices and methods used by each theory may prove an excellent tool for preventing some typical insider threats from occurring.

Behavior prediction theories can be of help in avoiding creating circumstances resulting in increased insider threat levels. However, an organization needs to be prepared to deal with insider threats, both preemptively and to be prepared to provide an adequate response to any cases of malicious insider actions.

 

Countering Insider Threats

The fight with insider threats starts with the initial hiring interviews. Organizations need to create a healthy work environment that minimizes the risks of malicious insider behavior and educates their employees to avoid becoming unintentional insider threats or pawns.

Other countermeasures may include:

  • Monitoring files and activity on all core digital resources within the organization
  • Keeping track of all sensitive data and identify where sensitive files are located
  • Implementing a zero-trust policy and adopt a least privilege model for access to data and digital assets
  • Employing advanced security analytics tools featuring machine learning and AI capabilities to detect abnormal behavior
  • Building a culture of IT security awareness across the organization and train the employees to avoid common cybersecurity mistakes

 

The abovementioned techniques and methods are the building blocks of a broader framework to deal with insider threats and other cybersecurity risks and involves multiple cybersecurity tools.

 

Tools to Fight Insider Threats and Other Cybersecurity Risks

Insider threats do not exist in a vacuum, and organizations should address the risks associated with bad insiders along with a plethora of other cybersecurity risks concerning malicious software, Denial of Service attacks, ransomware targeting corporate machines, and any other threats.

Organizations can take advantage of five categories of tools to mitigate the risks associated with cyber threats and insider threats, including:

  • User Activity Monitoring (UAM) to track the actions and activities of users and detect signs of insider threats
  • Data Loss Prevention (DLP). DLP tools control how users interact and protect data at rest, in motion, and in use, through deep content analysis
  • Security Information and Event Management (SIEM) to collect and aggregate logs from networked devices in a centralized place for analysis. SIEM also equips organizations with rulesets to respond to detected abnormal behavior
  • Analytics tools with machine-learning and statistical capabilities to generate alerts on anomalous behavior and abnormal user actions
  • Digital forensics tools to perform an in-depth analysis of successful data breaches or leaks

Whatever a tool or combination of tools an organization may deploy, the focus should be on adopting data-centric and not system-centric cybersecurity.

 

Conclusion

Every organization should be creating and running a program to counter insider threats while adopting a security policy to mitigate insider threat risks and other major cybersecurity threats.

A combination of thoughtful implementation of behavior prediction theories and the adoption of tools to detect digital warning signs is optimal. Adopting a basic insider threat protection program is affordable even for small organizations, while it is a major prerequisite for sustainable IT security in an environment in which every employee is a potential insider threat.


Vulnerabilities Managed.

Contact us for a no-cost consultation and security assessment

Topics from this Article

Vulnerability Management, Threat Hunting, User Privileges, User Access, UEBA

Datashield
Datashield
Official Datashield account for blog content, news, announcements and more. The articles authored include a collaboration between internal staff, specifically the security operations and marketing team.

Related Posts

How Datashield and ExtraHop Work Together

Learn how Datashield partners with ExtraHop, our premier Network Detection and Response (NDR) partner, from our Director of Product Management Mike Heller. I first met the ExtraHop team at RSA Conference 2020, just weeks before the world changed from COVID-19. After the initial meet and greets, we decided to schedule a time to do a deep dive post-conference. Datashield saw an immediate value-add that our service would bring from a technology perspective.

What is Cyber Insurance?

Statistics show that the fallout from successful cybersecurity incidents has both financial and business-related consequences. A data breach costs the average enterprises approximately $60,000, and in extreme situations, small and medium-sized businesses may go out of business within 6 months from the date the incident occurred. Thus, to determine whether the financial cost of successful hacking attempts, businesses have turned to insurance to deal with extensive losses.

Datashield featured on Legal Podcast

Datashield was recently featured on a legal podcast, The Rose Report. Our CISO David Norlin spoke with host Madelaine Braggs on new cyber risks and vulnerabilities targeting the real estate industry.