Report
Report
Report
Cybersecurity
in US States
A Special Investigation of US States’ Attack Surface
Ransomware Spotlight Report 2023
Latency Analysis Securin Attack Surface Management (ASM) passively scanned and discovered Exploitable Exposures
Special Snapshot: Cybersecurity in the
262,000 internet-facing assets across 50 US states and investigated their cyber
US States
hygiene to understand the potential dangers they are exposed to. The assets we
Noteworthy Trends and Interesting
scanned include visible internet hosts, web applications, APIs, CIDR (Netblock), and RCE/PE
Facts
certificates. While exposure5 is a broad term, in Securin ASM, we consider
Future Predictions
misconfigurations (DNS, email servers, hosts, and applications), data leaks (email Ransomware
Conclusion Exposures
breaches), and vulnerabilities in products as part of the exposure metric.
About Us
Appendix
Securin ASM analyzed discovered assets, identified exposures, and adopted a funnel approach
to prioritize the most dangerous exposures based on the severity, impact, and criticality of assets.
5
Aggregated number of vulnerabilities on hosts is described as Exposures
51
Ransomware Spotlight Report 2023
Owned Assets
Executive Summary 80000
attack surface with maximum number of assets, followed by the Midwest.
Report Methodology Massive expanding attack surfaces are the crux of the problem for all 60000
64607
Key Findings government entities, as unknown, unmanaged assets within these attack 56917
40000 48064
Ransomware Metrics surfaces can invariably expose sensitive data or provide a path for
MITRE Analysis adversaries to infiltrate critical assets. 20000
Owned Assets
109978
Our analysis found that the Southern states had the maximum open 107951
About Us 80000 100035
89476
exposures, followed by the West. This spotlights the need for a dedicated
Appendix 60000
discovery engine that would continuously discover known and unknown
40000
assets that operate within the expanding attack surface. Unmanaged and
unknown assets with dangerous exposures and vulnerabilities are favorite 20000
Region
52
Ransomware Spotlight Report 2023
Region
the Midwest region had more exploitable exposures, followed closely by the
Ransomware Metrics
South.
Northeast 4226
MITRE Analysis
An examination of these exploitable CVEs based on CVSS scores showed that
Scanner and Weakness Analysis
8 were critical and 22 of them were rated high. In contrast, Securin VRS rated Midwest 6655
Latency Analysis 56 as critical and 3 as high.
Special Snapshot: Cybersecurity in the Exploitable Exposures
US States
Noteworthy Trends and Interesting CVSS Scores VRS Scores We also identified two exploitable vulnerabilities, CVE-2019-6111 and
Facts
Future Predictions
Critical High Medium Critical High Medium CVE-2019-6110, tied to the infamous Ryuk ransomware. Ryuk is
Low Informational Low notorious for targeting hospitals, especially in 2020, when the world was
Conclusion
in the grip of a pandemic. The attacks on US hospitals in California, New
About Us 2 3
8 2
2
York, and Oregon and also in the UK and Germany crippled the healthcare
Appendix
infrastructure and impaired critical care treatments. In the latter part of
2020, a spate of attacks on dozens of US hospitals led to the shutting
32 22 56
down of hospitals, as healthcare administrators could not access patient
records; it also disrupted chemotherapy treatment for cancer patients in
critical condition.
53
Ransomware Spotlight Report 2023
Table of Contents Ryuk is known to be favored by the FIN12 Advanced Persistent Threat (APT) group among other types of code, such as Conti, Hive, and BlackCat. The
Introduction
latter two, Hive, and BlackCat, have been ravaging multiple organizations in cyber attacks in 2022. Conti is believed to be the successor of Ryuk and saw
a slow but steady rise on the ransomware charts, while incidents of the Ryuk ransomware slowly dwindled in 2021.
Executive Summary
Report Methodology
Interestingly, despite this association with this notorious ransomware strain, the CVSS V2 and V3 rate these vulnerabilities as medium severity with scores
of 4 and 6.80, respectively, while Securin VRS rates it as a high-severity vulnerability with a score of 7.86. Both vulnerabilities (CVE-2019-6111 and
Key Findings
CVE-2019-6110) have been found trending on the internet as a point of interest.
Ransomware Metrics
MITRE Analysis Based on the number of exposures found in the US, the most important question would be whether these regions have visibility into their attack
Scanner and Weakness Analysis surface. If yes, are they prioritizing the right kind of exposures for remediation?
Region
Conclusion
RCE/PE exploits, followed by the West. Approximately 13% of exploitable
Northeast 485 4226
About Us vulnerabilities are RCE/PE, which is a worrying metric.
Appendix
We have seen higher adoption of these exploits by ransomware operators Midwest 410 6655
When we examined the susceptibility metric, the South region took the lead with 1.55 exposures per 100
assets, followed by the Northeast region with 1 exposure per 100 assets. From an overall perspective, this
is a worrying metric as all US regions have assets with this dangerous exposure.
54
Ransomware Spotlight Report 2023
Table of Contents Our research shows that there are 64 exploitable vulnerabilities in the US, and of them, 19 CVEs have been classified as RCE/PE exploits. We examined
Introduction
their severity ratings and found that four have been rated critical and six as high severity vulnerabilities, but in comparison, VRS rates 18 (out of 19) as
critical, because exploitability of the vulnerability is a key scoring factor for Securin VRS..
Executive Summary
Report Methodology Among the 19 RCE/PE vulnerabilities, our experts highlighted the
CVSS Scores VRS Scores
Key Findings
following vulnerabilities for prioritized patching as they could be
Critical High Medium Critical Low
exploited on public-facing assets
Ransomware Metrics
MITRE Analysis
1 • CVE-2019-0211 (Apache, Fedora Project, Canonical, Debian,
4
openSUSE)
Scanner and Weakness Analysis
9 • CVE-2018-19518 (PHP, Debian, UW IMAP Project, Canonical)
Latency Analysis
• CVE-2009-2521 (Microsoft)
Special Snapshot: Cybersecurity in the
US States 6 18
Noteworthy Trends and Interesting Ransomware Impacted Assets Vs Count of Exposure by Region
Facts
55
Ransomware Spotlight Report 2023
Table of Contents The Midwest has the maximum number of ransomware exposures (instances of the affected assets being used within the attack surface), closely followed
Introduction
by the West and the South. In terms of impacted assets, the South is in first place, followed closely by the West. In terms of ransomware susceptibility ratio,
the South has 0.94 exposure per 100 assets, followed by the Midwest with 0.93 exposures.
Executive Summary
Report Methodology This means that for every 100 assets, one asset is susceptible to ransomware.
Key Findings
The Midwest has the highest number of assets with ransomware-associated vulnerabilities. We also found that one-third of the Midwestern
Ransomware Metrics
states (4 out of 12 states) have a higher risk of experiencing a ransomware attack as the count of their ransomware exposure is higher than their
MITRE Analysis
RCE/PE count.
Scanner and Weakness Analysis CVE ID Severity Scores Vendor & Product
In comparison, the Northeast has the lowest ransomware exposure and least
Latency Analysis CVE-2019-6109 CVSS V2 - 4.00 (Medium) OpenBSD, WinSCP,
impacted assets. CVSS V3 - 6.80 (Medium) Canonical, Debian, NetApp
Special Snapshot: Cybersecurity in the VRS - 7.86 (High)
US States We also identified four ransomware-associated vulnerabilities in all regions, and
CVE-2019-6111 CVSS V2 - 5.80 (Medium) OpenBSD, WinSCP,
Noteworthy Trends and Interesting incidentally, they all are tied to Ryuk ransomware. Interestingly, CVE-2019-6109 CVSS V3 - 5.90 (Medium) Canonical, Debian, Red Hat
Facts VRS - 7.86 (High)
and CVE-2018-20685 do not have any publicly known exploits; however, both
CVE-2019-6110 CVSS V2 - 4.00 (Medium) OpenBSD, WinSCP, NetApp
Future Predictions
vulnerabilities are associated with Ryuk ransomware. Securin ASM powered by VRS CVSS V3 - 6.80 (Medium)
VRS - 7.86 (High)
Conclusion
metrics, takes this threat context into consideration and assigns a higher score to
CVE-2018-20685 CVSS V2 - 2.60 (Low) OpenBSD, WinSCP, NetApp,
About Us vulnerabilities for their association with Ryuk ransomware despite the lack of CVSS V3 - 5.30 (Medium) Debian, Canonical, Red Hat,
Oracle
VRS - 7.66 (High)
Appendix publicly known exploits.
Assets with ransomware-associated vulnerabilities can put an entire state’s machinery and infrastructure at high risk. Unless the government entities in all
the regions have a greater visibility into their attack surface and the assets that operate within, they are at risk of becoming the next ransomware victim.
To protect an ever-expanding attack surface, organizations need a robust ASM solution that will continuously prioritize exposures and help remediate
them. Automated discovery of all assets and continuous asset monitoring based on criticality, impact, exploits, and threat associations is the need of the
hour for these regions.
56
Ransomware Spotlight Report 2023
Executive Summary CISA has mandated Federal Civilian Executive Branch (FCEB) entities to 800
remediate all Known Exploited Vulnerabilities (KEVs) within stipulated 700 778
Report Methodology
deadlines. The KEV catalog is a dynamic list of vulnerabilities that have 600
Key Findings
CISA KEVs
been exploited in the past or present; it presents clear remediation 500
Ransomware Metrics 509
400
guidelines allowing organizations to patch without any complication.
MITRE Analysis 300 408
CISA has been updating the KEV catalog with the trending list of CVEs 314
Scanner and Weakness Analysis 200
that can cause immediate harm. However, as CVSS scores are unreliable
100
Latency Analysis and NVD and MITRE latencies have been enabling adversaries, the CISA
0
Special Snapshot: Cybersecurity in the KEV catalog is the best option for organizations to kick-start their West South Northeast Midwest
US States
vulnerability prioritization framework. Region
Noteworthy Trends and Interesting
Facts
Future Predictions
We found five CISA KEV exposures in all US regions.
The South has the highest CISA KEV exposures CVE ID Vendor & Product Deadline
Conclusion
followed by the Northeast. Unfortunately, the
About Us
deadlines for patching these KEVs have already CVE-2019-0211 Apache, Fedora Project, Canonical, Debian, May 3, 2022
Appendix lapsed. openSUSE
CVE-2021-40438 Apache, Fedora Project, Debian, NetApp, F5, Oracle, Dec 15, 2022
Siemens
57
Ransomware Spotlight Report 2023
Latency Analysis
Conclusion
2000 2304 Yet another common attack vector that puts organizations at high risk is
2217
About Us
non-production environments and internal IPs exposed to the internet. Internal
1875 1881
Appendix 1500
IPs and test environments must be used internally, but hackers can use leaked
1000 test credentials to log into these environments and access massive volumes of
500 customer data. The Midwest has the highest internal assets exposed to the
internet, followed closely by the South.
0
West South Northeast Midwest
Region
58
Ransomware Spotlight Report 2023
15000
0
MITRE Analysis West South Northeast Midwest
Latency Analysis The exposure of email IDs in a breach is a significant security risk, as it paves the way for
Email Breaches by Region
Special Snapshot: Cybersecurity in the phishing, internal sabotage, and fraud attacks. Our analysis found that the Western region had
US States
800
the maximum email addresses exposed in breaches, with 638 email credentials available in the
Email Breaches
Noteworthy Trends and Interesting
Facts deep and dark web. This makes it extremely easy for anattacker to gain unauthorized access 600 638
Future Predictions and move laterally within the environment, and access assets with sensitive information. 400
399
Conclusion Based on these passive scans, the Southern region seems to be most vulnerable with the 200
311
217
About Us highest open exposures, exploitable exposures, and RCE/PE exploits; it also has the most
0
Appendix
assets with ransomware-associated vulnerabilities and the highest unpatched exposures to
West South Northeast Midwest
KEVs.
Region
Based on our analysis, our experts have prioritized the top 10 vulnerabilities found in all the US State regions that need to be prioritized for
patching immediately.
59
Ransomware Spotlight Report 2023
Table of Contents
Conclusion
Introduction
Executive Summary
Report Methodology Overall, the US regions need better visibility into their attack surface, followed by continuous remediation of key exposures. These key exposures need to
Key Findings be prioritized by the impact and criticality of the asset so that agencies can remediate the most dangerous exposures first. Adopting automated solutions
Ransomware Metrics to continuously monitor and discover unknown assets will help shrink these attack surfaces. Any state entities that run their vulnerability management
MITRE Analysis
program based on CVSS scores will be severely disadvantaged. As the CISA KEV catalog does not yet list all the vulnerabilities associated with ransomware,
US state entities may need to augment their vulnerability management program with an accurate vulnerability intelligence feed and a contextualized
Scanner and Weakness Analysis
scoring system to help vulnerable regions gain resilience against adversaries.
Latency Analysis
Future Predictions
Conclusion
About Us
ASM
Appendix
REQUEST A DEMO
https://securin.io/
Discover all your known and unknown assets & prioritize your most dangerous exposures
60
Ransomware Spotlight Report 2023
Executive Summary For the past three years, Securin experts have been tracking vulnerabilities associated with ransomware and their usage by various ransomware gangs. We
Report Methodology observed the vulnerabilities quadruple in 2020 during the COVID pandemic, which facilitated prolific cyber attacks and brought the focus firmly back on
Key Findings
cyber hygiene. Securin launched its product arm to help customers defend against cyber attacks through Securin Attack Surface Management (ASM) and
Securin Vulnerability Intelligence (VI).
Ransomware Metrics
MITRE Analysis
Conclusion
About Us VI
Appendix
Securin VI provides security teams with an entire spectrum of vulnerability information consumable via an intuitive
dashboard or APIs. Powered by 700+ authentic intelligence feeds, Securin VI’s AI and ML models continuously
measure a vulnerability’s risk by dynamically tracking its trajectory from exploitation to weaponization.
61