09:40 AM
Connect Directly

Privileged Account Control Still Weak In Most Organizations

Two studies this week show there's a long way to go in securing credentials for risky accounts.

A pair of studies out this week illustrate how privileged account management remains the bane of infosecurity programs, as most enterprises still struggle to control these accounts in spite of the risk they pose.

The risk is significant, according to a study by CyberArk  that analyzed dozens of enterprise networks and found that 88% are significantly susceptible to attacks through privileged credentials theft and abuse. In about 40% of the cases, simple Windows hosts offer attackers all the credentials they need for a complete network takeover.

Meanwhile, a survey of IT security leaders conducted by Dimensional Research on behalf of Dell found that most understand the importance of managing privileged accounts. One in four believe better control over these accounts would reduce their likelihood for breach. And 80% of respondents say they do at least have a defined process for managing them. The problem is that in many instances that process is pretty unreliable.

For example, just about one in three of these respondents say that management process is tracking these accounts using Excel or other spreadsheets. Additionally, 37% of respondents report that default admin passwords on hardware and software are not consistently changed; and the same ratio of respondents report that multiple administrators share credentials.

"Privileged accounts really are the 'keys to the kingdom,' which is why hackers seek them out and why we've seen so many high-profile breaches over the past few years use these critical credentials," says John Milburn, executive director and general manager of identity and access management for Dell Security.

This jibes with other statistics released elsewhere this year. For example, the Verizon Data Breach Investigations Report found that one in five security incidents is caused by privileged account misuse. Meanwhile, anecdotal evidence supports the evidence that these accounts are an Achilles heel of enterprise-class organizations. For example, the massive breach at the Office of Personnel Management earlier this year could be attributed to weaknesses in privileged account management at the agency and its associated contractors.

"With credentials for a privileged account, an attacker can gain complete control over the host or hosts that accept those credentials," the CyberArk report said. "This allows the attacker not only to access and breach all the sensitive data on those hosts,
 but also to perform other malicious actions such as installing malware and disabling or reconfiguring security controls."


Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Well, at least it isn't Mobby Dick!
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-03-22
IBM Content Navigator 3.0CD could allow attackers to direct web traffic to a malicious site. If attackers make a fake IBM Content Navigator site, they can send a link to ICN users to send request to their Edit client directly. Then Edit client will download documents from the fake ICN website. IBM X...
PUBLISHED: 2019-03-22
IBM API Connect 2018.1 and 2018.4.1.2 apis can be leveraged by unauthenticated users to discover login ids of registered users. IBM X-Force ID: 156544.
PUBLISHED: 2019-03-22
An issue was discovered in the SFTP Server component in Core FTP 2.0 Build 674. A directory traversal vulnerability exists using the SIZE command along with a \..\..\ substring, allowing an attacker to enumerate file existence based on the returned information.
PUBLISHED: 2019-03-22
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
PUBLISHED: 2019-03-22
rbash in Bash before 4.4-beta2 did not prevent the shell user from modifying BASH_CMDS, thus allowing the user to execute any command with the permissions of the shell.