Information-stealing malware has become extremely pervasive in recent years. This malware harvests millions of credentials annually from endpoint devices and enterprises across the globe to devastating effects.
Using highly automated and orchestrated attack methods, threat actors and initial access brokers provide an endless supply of compromised credentials to cyber criminal syndicates who use those credentials as early points of entry into company networks, databases and critical online applications.
Due to evolving tactics and variants, this type of malware has proven to be highly evasive against many current security solutions. Most victim organizations only become aware of credential theft after those credentials appear for sale on dark market sites or as part of credential-based intrusions. Consequently, the overall mean time to detect (MTTD) allows ample opportunity for threat actors to put the stolen credentials to use, greatly increasing the likelihood of data access, network compromise or ransomware.
In times of ever-increasing risk, organizations must find new ways to protect their credentials against the plague of info-stealers.
An Alternative Solution
Knowing that information-stealing malware will likely bypass security tools and successfully steal user credentials, I recently proposed an alternative detection method.
CredInt is both OS and device-agnostic. It employs readily available technologies and a systematically created credential pair saved onto each end-user device. In addition, it also utilizes a web-accessible login portal used to initiate alert logic when those specific credentials are attempted.
Following the Attack Cycle
From the attacker’s perspective, the millions of credentials that are harvested will always require some validity checking (at scale) to verify that the stolen credentials are active and marketable. This becomes the reliable constant in the attack cycle where malicious activity can be instantly observed.
By purposely creating a unique credential pair tied specifically to an end-user device for immediate identification, the “CredInt” pair can be used to trigger an alert when attempted against a corresponding web portal registered for the specific credential combination.
Uses, Limitations and Expectations
The concept of CredInt poses no actual harm or risk to the end user or the organization that deploys this method. It only comes into action once attackers have already successfully extracted credentials and attempted to use them.
Additionally, this method is not overly complicated to deploy or manage. Current web-app technology could be tailored for this specific controlled functionality and to protect the anonymity of both the web portal and the backend collection servers. It is scalable and retroactively compatible with all devices.
In a traditional honeypot implementation, a system is purposely exposed to entice and attract attacker activity. Unfortunately, false positives are a frequent result. CredInt is different: it’s a detection method only. No direct interaction is expected or provided on the end user device. It is designed as an alerting function based on anticipated external attack-chain events of compromised credential validation.
CredInt will also provide incredibly high-quality cyber intelligence and forensic value on the identified victim machine. That data can be shared across other security platforms and internal security teams to further bolster protection.
Finally, many organizations run OTP or MFA and password manager authentication solutions to provide enhanced access controls. CredInt will still provide an observable security event if a victim machine suffers browser-sourced information-stealer malware, which may have gone undetected. This includes detection on devices that store other critical data such as Crypto Wallets, Tokens or API Keys.
It’s clear that organizations must start implementing new methods of securing their data. To combat info-stealing malware, CredInt proposes one possible solution.
The post Detection Methods: Do You Know Where Your Credentials are? appeared first on Security Intelligence.