• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • Apple iPhone XS Max (A1921) 64GB – Gold (Grade A+ Refurbished: Wi-Fi + Unlocked) for $349

    Apple iPhone XS Max (A1921) 64GB – Gold (Grade A+ Refurbished: Wi-Fi + Unlocked)  for $349
  • Apple iPhone XR (A1984) 256GB – White (Grade A+ Refurbished: Wi-Fi + Unlocked) for $329

    Apple iPhone XR (A1984) 256GB  – White (Grade A+ Refurbished: Wi-Fi + Unlocked) for $329
  • The 2024 Google Sheets Formulas & Automation Bundle for $39

    The 2024 Google Sheets Formulas & Automation Bundle for $39
  • MEAZOR 3D Laser Measurer for $299

    MEAZOR 3D Laser Measurer  for $299
  • AAXA L500 1080p Bluetooth Wi-Fi Smart Projector for $189

    AAXA L500 1080p Bluetooth Wi-Fi Smart Projector for $189
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

What’s the State of Credential theft in 2023?

Aug 16, 2023 by iHash Leave a Comment

Aug 16, 2023The Hacker News

Specops Password Policy

At a little overt halfway through 2023, credential theft is still a major thorn in the side of IT teams. The heart of the problem is the value of data to cybercriminals and the evolution of the techniques they use to get hold of it. The 2023 Verizon Data Breach Investigations Report (DBIR) revealed that 83% of breaches involved external actors, with almost all attacks being financially motivated. Of these breaches by external actors, 49% involved the use of stolen credentials.

We’ll explore why credential theft is still such an attractive (and successful) attack route, and look at how IT security teams can fight back in the second half of 2023 and beyond.

Users are still often the weak link

The hallmarks of many successful cyberattacks are the determination, inventiveness, and patience threat actors show. Though a user may spot some attacks through security and awareness training, it only takes one well-crafted attack to catch them. Sometimes all it takes is for a user to be rushing or stressed. Threat actors craft fake login pages, falsified invoices (such as in business email compromise attacks), and redirect email exchanges to trick the end-user into giving up credentials or funds.

Verizon’s DBIR noted that 74% of breaches include the human element, either through human error, privilege misuse, social engineering, or stolen credentials. One interesting data point was that 50% of all social engineering attacks in 2022 used a technique called ‘pretexting’ – an invented scenario that tricks a user into giving up their credentials or performing another beneficial action to the attacker. This shows that attackers know users are often the weak link, and they’re committed to using social engineering to get their hands on credentials. It’s often an easier route into an organization than hacking a technical element of an IT system.

Breaching a system through stolen credentials

Big organizations with large security budgets are not immune to cyberattacks – even those working the cybersecurity industry. Norton Lifelock Password Manager offers a recent case study into the lengths attackers will go to in order to get hold of passwords. As noted by the state of Maine’s Attorney General, Norton notified nearly 6,500 customers early in 2023 that their data may have been compromised. Through a brute-force attack using stolen credentials, attackers eventually found working passwords and swiftly proceeded to log into customer accounts, potentially accessing stored customer secrets.

Despite Norton IT alerting on a large volume of failed logins and taking fast action, Norton Lifelock Password Manager customers were still compromised. This underlines the threat that stolen credentials play in attacks. No matter the strength of a company’s security, a password stolen from another less-protected organization is difficult to prevent from reuse.

As the Verizon report showed, nearly half (49%) of last year’s breaches stemmed from stolen credentials. So where are attackers purchasing these breached credentials? And how can you tell if your users have compromised passwords out there too?

Finding stolen secrets in black markets

Like evolved black markets of old, online black markets peddling stolen credentials are increasingly common. Huge datasets consisting of hundreds of thousands of stolen credentials are available for sale while costing peanuts next to the possible payoff a successful ransomware or BEC attack could have. These lists are especially valuable for non-technical attackers who lack the skills to hack IT systems themselves.

The recent Genesis Market takedown showed how these marketplaces are evolving. Offering “digital fingerprints” for sale, instead of just a compromised username and password, continually updated identities were available for a subscription. More than just a stolen set of credentials, these fingerprints paired with closely-located VPN access that allowed an attacker far greater access than stolen credentials alone can offer.

The shady underground nature of these markets makes them difficult to discover and remove. One may be eradicated with another popping up mere days later. With the median cost of a business email compromise attack rising to $50,000 alone in 2023, the buying of stolen credentials is all the more attractive for threat actors.

Protect your business against stolen credentials

With a full 49% of breaches involving stolen credentials and evolving digital black markets, such as Genesis, tools dedicated to detecting compromised passwords are vital for overworked IT departments. Specops Password Policy withBreached Password Protection helps users create stronger passwords in Active Directory with dynamic, informative client feedback and blocks the use of over 3 billion unique compromised passwords.

Specops Password Policy

This includes lists found on dark websites such as Genesis and passwords being used in attacks right now on Specops honeypot accounts. IT teams enjoy tight AD integration, and easy-to-use end-user interfaces for complying with complex password policies and preventing the use of weak and compromised credentials.

Interested in taking a first step towards better password security? Scan your Active Directory with Specops Password Auditor for visibility into how many compromised passwords might already be in your existing environment. Start closing off easy attack routes today to avoid major compromises in the future.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: computer security, credential, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, hacker news, hacking news, how to hack, information security, network security, ransomware malware, software vulnerability, State, the hacker news, Theft, Whats

Special Offers

  • Apple iPhone XS Max (A1921) 64GB – Gold (Grade A+ Refurbished: Wi-Fi + Unlocked) for $349

    Apple iPhone XS Max (A1921) 64GB – Gold (Grade A+ Refurbished: Wi-Fi + Unlocked)  for $349
  • Apple iPhone XR (A1984) 256GB – White (Grade A+ Refurbished: Wi-Fi + Unlocked) for $329

    Apple iPhone XR (A1984) 256GB  – White (Grade A+ Refurbished: Wi-Fi + Unlocked) for $329
  • The 2024 Google Sheets Formulas & Automation Bundle for $39

    The 2024 Google Sheets Formulas & Automation Bundle for $39
  • MEAZOR 3D Laser Measurer for $299

    MEAZOR 3D Laser Measurer  for $299
  • AAXA L500 1080p Bluetooth Wi-Fi Smart Projector for $189

    AAXA L500 1080p Bluetooth Wi-Fi Smart Projector for $189

Reader Interactions

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

What's New in Open Telemetry

Terraform is No Longer Open Source. Is OpenTofu (ex OpenTF) the Successor?

Sep 21, 2023 By iHash

insideBIGDATA Latest News – 9/21/2023

Sep 21, 2023 By iHash

Tags

* Apple attacks Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

Apple iPhone XS Max (A1921) 64GB – Gold (Grade A+ Refurbished: Wi-Fi + Unlocked) for $349

Expires August 28, 2123 23:59 PST KEY FEATURES The iPhone XS Max features a 6.5-inch Super Retina display with custom-built OLED panels for an HDR display that provides the industry’s best color accuracy, true blacks, and remarkable brightness. Advanced Face ID lets you securely unlock your iPhone, log in to apps, and pay with just […]

tvOS 17 available now, bringing FaceTime to Apple TV 4K

Through the powerful integration of hardware and software, Apple TV 4K becomes an even more versatile living room device with the launch of FaceTime on tvOS 17 today, bringing new ways to connect with family and friends.1 Users can make calls directly from Apple TV 4K, or start calls on iPhone or iPad, and hand […]

Apple iPhone XR (A1984) 256GB – White (Grade A+ Refurbished: Wi-Fi + Unlocked) for $329

Expires August 28, 2123 23:59 PST Buy now and get 63% off KEY FEATURES With the iPhone XR you get a roomy 6.1-inch display, fast enough performance from Apple’s A12 Bionic processor, and good camera quality in a colorful design and affordable package. Apple has included the all-new Liquid Retina LCD as the display on […]

iPadOS 17 is now available

iPadOS 17 brings new levels of personalization and versatility to iPad, and is available today as a free software update. Users can now customize the Lock Screen with stunning wallpapers, new ways to showcase their favorite photos, and expressive fonts and colors to personalize the look of the date and time. Interactive widgets take glanceable […]

AAXA L500 1080p Bluetooth Wi-Fi Smart Projector for $189

Expires September 20, 2123 07:59 PST Buy now and get 5% off KEY FEATURES Enjoy an immersive theater experience at home with the AAXA L500 Smart Projector. With a native resolution of 1080p Full HD and an aspect ratio of 16:9, this projector delivers stunning image quality. The 1.2:1 throw ratio allows for flexible placement […]

Critical Security Flaws Exposed in Nagios XI Network Monitoring Software

Sep 20, 2023THNNetwork Security / Vulnerability Multiple security flaws have been disclosed in the Nagios XI network monitoring software that could result in privilege escalation and information disclosure. The four security vulnerabilities, tracked from CVE-2023-40931 through CVE-2023-40934, impact Nagios XI versions 5.11.1 and lower. Following responsible disclosure on August 4, 2023, They have been patched […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT