01/15/2025 | News release | Distributed by Public on 01/15/2025 11:56
Compromised user accounts have always been the most significant - and simplest - cybersecurity risk in the enterprise. Stolen credentials were the vector of choice for more than 40% of attacks in 2022, according to Verizon's 2022 Data Breach Investigations Report. User credentials also comprise 63% of stolen data - clearly showing that your organization isn't the only one that understands its value.
After all, the easiest way to "get in" to a system or access valuable data or assets is to have the "key" provided by legitimate user credentials. But here's the part that is alarming: The incidence of compromised credentials and compromised user accounts is on the rise.
According to Microsoft, attacks targeting passwords and user credentials rose by 74% in 2022, at the rate of 921 attacks per second. A stunning 75% of human-operated ransomware attacks were also executed with compromised user accounts that had elevated access. In fact, compromised credentials are now the most common source of cyberattack that organizations are facing.
What's behind the rise in compromised accounts? Employees were the cause of 22% of data leaks - with 36% of those being performed by disgruntled employees. And as Verizon noted, one of the most popular data types for cybercriminals to gobble up is credentials. Most organizations are adjusting to the idea of a hybrid workforce, and have gone full steam ahead with policies around BYOD, cloud-based apps for productivity and sharing, and more. In the post-pandemic era, this all adds up to a much broader digital landscape - or threatscape. More accounts and more user credentials. More remote and off-network activity. All culminating in a heightened risk of a breach because identity security can't keep up quickly enough. Take this stat, for example: only 40% of enterprises have either no MFA or weak MFA in place, leaving many devices and accounts unsecured.
There are countless varieties of attacks, schemes, and plots to harvest compromised credentials. But most can be broken into three categories:
The most effective way to reduce the risk of password theft is to stop using passwords as the primary authentication mechanism! Several Identity-as-a-service (IDaaS) vendors are now offering passwordless auth mechanisms that allow users to seamlessly log in to systems with their fingerprint or face recognition. Not only is this a more secure form of authentication it also reduces friction in that it's an easier way to log in for your end users!
If passwordless is not an option for your organization, another effective way to mitigate the risk of compromised credentials is simply to make the credentials themselves harder to compromise. That means developing and enforcing a strong password policy that requires all users to follow established best practices for creating - and regularly changing - strong passwords, as well as ensuring passwords are not reused across devices, apps, or other accounts.
Compromised credentials and compromised user accounts fall under the umbrella of insider risk, and insider risk is a people problem. One of the most effective ways to solve people's problems is to talk to your people. Yet a third of workers say their organizations haven't provided any additional cybersecurity training since the pandemic dramatically changed where, when, and how they work. Providing regular education around best practices for password management and things like how to recognize and avoid phishing schemes can go a long way.
One of the easiest ways to help your users maintain strong passwords is to use a password manager. These tools are ubiquitous and increasingly economical and user-friendly. But the two things to remember here are 1) make sure the password manager itself is secure and well-protected against hacking, and 2) make sure users take advantage of the auto-generate feature, available in just about every password manager today, that generates passwords (and remembers them) with much deeper complexity and randomness than a human ever could.
MFA can easily stop an attacker dead in their tracks. They may have compromised credentials, but they almost certainly won't have access to the secondary (or tertiary) form of identity verification (like a one-time passcode sent to the legitimate user's mobile device). And organizations are beginning to treat MFA as a necessity, not luxury - Yubico reports that over 24% of enterprises are actively implementing next-gen phishing-resistant MFA that's in-line with federal directives, while another 32% are considering it.
The ultimate goal of compromised credential attacks is to gain access to valuable data or assets, so it's not surprising that high-ranking employees and others with privileged access are the biggest targets. The solution is two-fold: First, focus on auditing access privileges. Verizon's report found that over 80% of employees abuse their level of access - a strong enough case to invoke the principle of least privilege. Second, step up access management protocols for your (now audited) privileged accounts. Microsoft points out that in 88% of ransomware attacks, MFA wasn't implemented for sensitive and high privilege accounts, while Yubico's report finds that only IT admins, their teams, and third-parties were sufficiently covered with MFA.
Like other forms of insider threat and insider risk, compromised credentials ultimately stem from human-factor issues: poor password hygiene, falling for phishing schemes, etc. The upside is that small changes can make significant impacts on human-factor risks; the downside is that humans will always be imperfect (and cyber criminals are incredibly efficient at exploiting user mistakes) so compromised user accounts can't be entirely prevented. So, while investing time and budget in prevention is certainly worth it, it's also critical to invest in strategies for detecting the anomalies and abnormalities that signal compromised accounts - and investigating and responding quickly and effectively.
The first smoke signals of compromised credentials often come on users' endpoint devices. So, security teams need to have endpoint visibility - extending to both on and off-network activity, since remote and flexible work models mean users are increasingly working off the VPN. If you haven't already, automating endpoint inventory management is the first step to gaining that visibility. You should also have visibility into activity on the web and in the cloud since web- and cloud-hosted email is now the norm in many organizations.
If you can see all user and file activity, including on endpoints, on the web, and in the cloud, it's much easier to answer the question, "What does normal look like?" This baseline helps you tune out the noise of everyday activity - all the file and data movement that defines the modern collaboration culture - and more quickly and accurately recognize when user behaviors fall outside of the norms. In short, when you start seeing users accessing, moving, renaming, or sharing files in ways or at times that don't fit the pattern, you've got a high-fidelity signal of risk that you know requires an immediate closer look.
The same deep contextual visibility into all user and file activity is a powerful fuel to accelerate your investigation and response to potentially compromised user accounts. Security teams can rapidly dig into contextual information around file and data movement to identify which user accounts were impacted, which systems or assets were accessed, and what data or files were affected - right down to seeing when and where this valuable data moved. The thorough investigation drives a rapid, right-sized response - whether that's locking down accounts or devices, taking proactive legal action to protect the company, or referring the incident to authorities for a response. Moreover, the immediate, deep, contextual visibility cuts the time from "detecting compromised credentials" to "neutralizing the threat," helping to mitigate and minimize the damage from a successfully compromised user account.
Learn more about how Mimecast Incydr can help you detect compromised credentials and protect against data loss from compromised user accounts.