Credential Scams Growing

By:  |  Category: Blog, Security Wednesday, October 3rd, 2018  |  No Comments
Credential Scams Growing

Love them or hate them but passwords are a twentieth-century solution to a twenty-first century problem.

And Hackers are exploiting our human tendency to pick the easiest passwords that we can remember. Kids, dogs, birthdays…sound familiar?

The Apple Credential Scam continues to roll through and trick unsuspecting folks who would never think someone could hack their Apple account…think again!

Unfortunately, user names and passwords – the most common digital credentials used today – are all that stands between your employees and vital online services including corporate networks, social media sites, e-commerce sites and others.

A good security practice is to use a completely different password for every service, but the fact is that nearly 40% of Americans replicate the same or very similar passwords for each service they use. Up to 47% of adults age 18-29 are using the same or very similar passwords for multiple online services, which only increases the risk for identity theft.

How Are Credentials Compromised?

Phishing

  • Con artists send e-mails disguised as legitimate messages
  • Trick users into disclosing credentials
  • Deliver malware that captures credentials

Malvertising

  • Hackers Inject malware into legitimate online advertising networks
  • Deliver malware to visitors that captures credentials
  • Watering Holes
  • Hackers target a popular site: social media, corporate intranet
  • Inject malware into the code of the legitimate website
  • Deliver malware to visitors that captures credentials

Web Attacks

  • Scan Internet-facing company assets for vulnerabilities
  • Exploit discovered vulnerabilities to establish a foothold
  • Move laterally through the network to discover credentials
  • What Can an Attacker Do with Compromised Credentials?
  • Send Spam from Compromised Email Accounts
  • Deface Web Properties and Host Malicious Content
  • Install Malware on Compromised Systems
  • Compromise Other Accounts Using the Same Credentials
  • Exfiltrate Sensitive Data (Data Breach)
  • Identity Theft

The average number of data records per company, including credentials, compromised during a data breach is 28,500!
User names and passwords represent the keys to the kingdom for malicious attackers. Criminals who know how to penetrate a company’s defenses can easily steal hundreds or even thousands of credentials at a time, each one representing another potential entry point to compromise the organization’s networks and data.

Protecting Against Credentials Compromise

While there is always a risk that attackers will compromise a company’s systems through advanced attacks, the fact is that most data breaches exploit common vectors such as known vulnerabilities, unpatched systems and unaware employees. Only through defense in depth – implementing a suite of tools such as security monitoring, data leak prevention, multifactor authentication, improved security awareness and others – can organizations protect their credentials and other digital assets from seeping onto the Dark Web.

“For [attackers targeting] big corporate networks, persistence and focus will get you in without a zero day; there are so many more vectors that are easier, less risky, and more productive.”- Rob Joyce, Chief, Tailored Access Operations (TAO), National Security Agency USENIX Enigma

The typical price range on Dark Web markets for compromised credentials, ranging from online services to corporate network usernames and passwords is $1.00-$8.00.

For those who make credentials available on the Dark Web, the financial rewards can be significant. A criminal dealing in stolen credentials can make tens of thousands of dollars from buyers interested in purchasing them. And by selling those credentials to multiple buyers, organizations that experience a breach of credentials can easily be under digital assault from dozens or even hundreds of attackers. (Brian Krebs, “Krebs on Security” blog, June 13, 2013)

Find out before the damage is done!

EnhancedTECH provides continuous searching, monitoring and reporting on the presence of your organization’s credentials on the Dark Web, and immediately notifies you so that you can take action before these critical digital assets are used to compromise your personnel, networks and data. Coupled with a layered approach to security, EnhancedTECH can help your organization to reduce the likelihood and impact of compromised credentials, meet compliance, and ensure that you’re not the next organization in the headlines for the wrong reason.

Samantha Keller

Samantha Keller

Director of Marketing and PR at EnhancedTECH
Samantha Keller (AKA Sam) is a published author, tech-blogger, event-planner and mother of three fabulous humans. Samantha has worked in the IT field for the last fifteen years, intertwining a freelance writing career along with technology sales, events and marketing. She began working for EnhancedTECH ten years ago after earning her Bachelor’s degree from UCLA and attending Fuller Seminary. She is a lover of kickboxing, extra-strong coffee, and Wolfpack football.Her regular blog columns feature upcoming tech trends, cybersecurity tips, and practical solutions geared towards enhancing your business through technology.
Samantha Keller

Latest posts by Samantha Keller (see all)

Leave a Comment
Read previous post:
Facebook Breach
Do you Facebook?

With 800 million users worldwide, Facebook has been breached again. On September 16, 2018, Facebook noticed unusual spike of users...

Close