Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
 
News

Research shows extent of network credential thefts

CyberArk Software : 11 November, 2015  (Technical Article)
CyberArk research examines network exposure to credential theft attacks which hijack privileged credentials and compromise enterprise security
Research shows extent of network credential thefts

CyberArk has released new research which found that, on average, 40 percent of network machines can provide cyber attackers with credentials enabling them to start an attack which could compromise an organisation’s entire network.

The report, “Analysing Real-World Exposure to Windows Credential Theft Attacks,” explores data from more than 50 networks to identify the prevalence and risk of what are referred to as “highly threatening machines.”  These machines are Windows-based workstations or servers that hold sufficiently privileged credentials that enable the attacker to compromise other machines and privileged accounts, culminating in a broad network compromise.  In fact, 88 percent of the networks scanned were found to be significantly susceptible to compromise through privileged account credential theft or abuse.

“In a given network, there are typically a number of highly threatening machines that can give an attacker the credentials needed to completely compromise the majority of Windows hosts on the network,” said Andrey Dulkin, director of cyber innovation at CyberArk Labs.  “We’ve seen similar credential theft methods as the basis for major attacks across a number of organisations.  Identifying these machines and securing the associated privileged credentials against theft and exploitation is a critical step in securing against advanced cyber attacks.”

In this research, CyberArk Labs details:

* Various credential abuse methods – including Pass-the-Hash, Overpass-the-Hash and other Kerberos attacks;
* The types of privileged accounts that pose the most danger to organisations – such as privileged user accounts and privileged service accounts;
* The effectiveness of specific mitigation strategies that can significantly lower the risk across different network types.

Research from CyberArk Labs focuses on targeted attacks against organisational networks – the methods, tools and techniques employed by cyber attackers, as well as methods and techniques to detect and mitigate such attacks.

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo