Research from CyberArk Labs has found that, on average, 40 percent of network machines can provide cyber attackers with credentials enabling them to start an attack which could compromise an organisation’s entire network.
The report, “
Analysing Real-World Exposure to Windows Credential Theft Attacks,” explores data from more than 50 networks to identify the prevalence and risk of what are referred to as “highly threatening machines.” These machines are Windows-based workstations or servers that hold sufficiently privileged credentials that enable the attacker to compromise other machines and
privileged accounts, culminating in a broad network compromise. In fact, 88 percent of the networks scanned were found to be significantly susceptible to compromise through privileged account credential theft or abuse.
“In a given network, there are typically a number of highly threatening machines that can give an attacker the credentials needed to completely compromise the majority of Windows hosts on the network,” said Andrey Dulkin, director of cyber innovation at CyberArk Labs. “We’ve seen similar credential theft methods as the basis for major attacks across a number of organisations. Identifying these machines and securing the associated privileged credentials against theft and exploitation is a critical step in securing against advanced cyber attacks.”
In this research, CyberArk Labs details:
- Various credential abuse methods – including Pass-the-Hash, Overpass-the-Hash and other Kerberos attacks;
- The types of privileged accounts that pose the most danger to organisations – such as privileged user accounts and privileged service accounts;
- The effectiveness of specific mitigation strategies that can significantly lower the risk across different network types.