A new cyber-security report reveals that while new and sophisticated malware variants were continually developed to exploit systems in 2013, criminals, hacktivists and advanced attacks continue to do the most damage by exploiting privileged accounts. Compiled by CyberSheath’s advanced security investigations team and commissioned by CyberArk, “The role of privileged accounts in high profile breaches,” also includes a detailed case study covering a Fortune 500 company’s struggle with, and eventual remedy for, a dramatic reduction in recorded breaches.
CyberSheath’s analysis of 10 of 2013’s most notable cyber attacks, including the NSA leak by insider Edward Snowden, point of sale (POS) breaches like the many attacks on retailers, and the attack on the New York Times found that privileged accounts were on each attacker’s critical path to success 100 percent of the time, regardless of the perimeter attack vector. The research uncovered that increased visibility and actionable intelligence on privileged accounts within an organisation’s IT environment greatly increased the ability for those organisations to successfully detect and disrupt an attack.
Highlights from “The role of privileged accounts in high profile breaches” report include:
* A case study: the true cost of a “do-nothing” approach
The exploitation of privileged accounts detailed in this case study directly led to more than 200 compromised machines, more than 10,000 man hours of overtime, and a total breach cost exceeding $3 million dollars in a six-month span. This real-world example explores one organisation’s privilege account problem and highlights lessons-learned throughout the remediation process.
* High profile attacks in 2013 leveraged privileged accounts
CyberSheath researched and analysed 10 benchmark attacks throughout 2013, including the NSA leak, POS breaches, the attack on the New York Times, MacRumors, U.S. banking institutions, the Department Of Energy (DOE), South Korean banking and broadcast networks, the Washington Post and attacks revealed by Mandiant’s APT1 report. Each of these attacks happened as a result of privileged account exploitation. The research showed that protecting, managing, and monitoring these accounts, organisations could have stopped these attacks before significant damage was done.
* Strategic takeaways for CISOs
Looking closely at the advanced attack patterns leveraged in these 10 benchmark breaches reveals that the theft, misuse, and exploitation of privileged accounts is a critical step in attack methodology.
Key takeaways for CISOs from the CyberSheath report include:
- The attacks that matter to business exploit privileged accounts 100 percent of the time
- Big company or small, organisations have more privileged accounts than they know about and the risk of exposure they represent makes them urgent priorities
- Protecting privileged accounts gives CISOs an opportunity to quantify risk reduction and deliver results that can be measured
- Privileged accounts represent a clear case for providing a return on investment and reduce risk
- Protecting privileged accounts is an opportunity to become a challenging target and take back ground in the fight against advanced threats
- Automated privileged account security solutions reduce human error, overhead and operational costs