The January 2022 International Committee of the Red Cross (ICRC) data breach was caused by an unpatched critical vulnerability in the Single Signe-In tool developed by Zoho, a business software development company.
After exploiting the vulnerability (tracked as CVE-2021-40539), the cybercriminals deployed offensive security tools to help gain access to ICRC's contact database, resulting in the compromise of more than 515,000 globally.
Offensive security tools are used by penetration testers to discover system vulnerabilities that could be potentially exploited by cybercriminals.
The sophistication of these offensive tools and obfuscation techniques adopted to prevent detection is only privy to a small number of Advanced Persistent Threat (APT) groups, suggesting this was likely a State Sponsored attack.
Learn about Advanced Persistent Threats >
"The hackers made use of considerable resources to access our systems and used tactics that most detection tools would not have picked up."
- Excerpt from ICRC's data breach statement.
The following sequence likely led to the Red Cross data breach.

See how your organization's security posture compares to the ICRC's.View ICRC's security report.
A series of important lessons can be learned from the Red Cross data breach. Applying them to your cybersecurity program could help your organization avoid a similar fate.
ICRC's vulnerability management processes failed to detect and address the exploit that led to this data breach - an oversight likely resulting from the difficulty of managing ICRC's complex, large-scale patching processes, which address tens of thousands of patches across multiple systems annually.
Unfortunately, cybercriminals are not sympathetic to complex cybersecurity problems. They will take advantage of whatever exploit they discover - especially when their attacks are well-planned and targeted, which seems to be the case in this instance.
Re-evaluate your current vulnerability patching routine to ensure it can rapidly address new critical vulnerabilities published on the National Vulnerability Database (NVD).
Despite having a multi-level cyber defense system in place comprising of endpoint monitoring and scanning software, ICRC was still breached. While it's fair to attribute the success of the attack to unusually sophisticated hacking techniques rather than the insufficiency of ICRC's cybersecurity program, this event highlights the importance of having backup processes for detecting security exploits should internal efforts fail.
Establish a regular penetration testing schedule for detecting network, system, and application vulnerabilities across your entire IT ecosystem. Pen testing methods should be commensurate to the complexity of cyberattacks likely to target your organization. High data breach risks industries, such as finance, healthcare, and technology, should assume they will be targeted by highly-complex cyber attackers.
If you prefer to manage pen testing internally rather than outsourcing to a third-party, here are some offensive security tools you should be aware of:

To defend against APTs, it is important to implement a multi-layered security strategy that includes the following: