Boring’s Not So Boring

Blog

  1. Home
  2.  » 
  3. Boring’s Not-So-Boring Blog
  4.  » Why you should monitor for exposed credentials

Why you should monitor for exposed credentials

Passwords are a twentieth-century solution to a modern-day problem. Unfortunately, usernames and passwords are still the most common method for logging onto services including corporate networks, social media sites, e-commerce sites and others. 

Usernames and passwords represent the keys to the kingdom for malicious attackers. Criminals who know how to penetrate a company’s defenses can easily steal hundreds or even thousands of credentials at a time. 

A criminal dealing in stolen credentials can make tens of thousands of dollars from buyers interested in purchasing credentials. And by selling those credentials to multiple buyers in the Dark Web, organizations that experience a breach of credentials can easily be under digital assault from dozens or even hundreds of attackers.

HOW ARE CREDENTIALS COMPROMISED? 

PHISHING

  • Send emails disguised as legitimate messages 
  • Trick users into disclosing credentials
  • Deliver malware that captures credentials

WATERING HOLES 

  • Target a popular site: social media, corporate intranet
  • Inject malware into the code of the legitimate website
  • Deliver malware to visitors that captures credentials

MALVERTISING

  • Inject malware into legitimate online advertising networks
  • Deliver malware to visitors that captures credentials

WEB ATTACKS

  • Scan Internet-facing company assets for vulnerabilities
  • Exploit discovered vulnerabilities to establish a foothold
  • Move laterally through the network to discover credentials

WHAT CAN AN ATTACKER DO WITH COMPROMISED CREDENTIALS? 

  • Send Spam from Compromised Email Accounts
  • Deface Web Properties and Host Malicious Content
  • Install Malware on Compromised Systems
  • Compromise Other Accounts Using the Same Credentials
  • Exfiltrate Sensitive Data (Data Breach)
  • Identity Theft

PROTECTING AGAINST CREDENTIAL COMPROMISE

While there is always a risk that attackers will compromise a company’s systems through advanced attacks, most data breaches exploit common vectors such as known vulnerabilities, unpatched systems and unaware employees. Only by implementing a suite of tools including monitoring, data leak prevention, multi-factor authentication, employee security awareness training and others – can organizations protect their business from the perils of the dark web. 

We now offer Dark Web Monitoring services that could protect your company’s credentials from being sold in the Dark Web. Contact us to learn more about this service. 

Contact Us

Share This