Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics //

Security Monitoring

Keep Watch On Accounts For Stolen Passwords

Log management and a well-refined ruleset can help companies pinpoint suspicious activity on accounts that suggest a password compromise

In the past week, three major online consumer services have acknowledged that their systems were breached and passwords leaked. The litany of incidents is a good reminder that companies should take another look at how they are managing and monitoring the access to their systems.

On Wednesday, social network LinkedIn confirmed that some of the 6.5 million password hashes leaked online belonged to users of its social network. Researchers have confirmed that the passwords were not mathematically hashed using an additional seed, or salt, allowing researchers to easily decrypt some 60 percent of the passwords in 48 hours. Two other companies, online dating service eHarmony and music service Last.fm, reportedly confirmed that some users' account credentials had also been leaked or stolen.

All three incidents demonstrated that the companies failed to monitor properly for suspicious access to their systems and password files, says Nick Percoco, senior vice president at security service provider Trustwave and the head of the company's SpiderLabs.

"All of these organizations found out about the leak because someone reported it to them," Percoco says. "Someone posted it on the online in a forum. And, if you are at LinkedIn, you heard about the incident at the same time that some like me did."

[A hacker claims to have infiltrated the personal Hotmail and Dropbox accounts of Republican presidential candidate Mitt Romney, after guessing his "favorite pet" security question to change the password. See Hacker Says He Accessed Pair Of Presidential Hopeful Romney's Online Accounts.]

It's not an uncommon problem. More than 90 percent of breaches were reported to a company by a third party, according to Verizon's 2012 Data Breach Investigations Report. Moreover, 84 percent of breaches left signs of the compromise in log files, and all but 3 percent of the breaches could have been stopped by simple or intermediate controls, the report stated.

Mine, your, logs
The Verizon data has a simple lesson for companies: Organizations that monitor logs for the right events will be able to catch suspicious accesses in their systems.

What's suspicious? That depends on your users and their use cases, says Joe Siegrist, CEO of online password service LastPass. Employees who suddenly log in from another country, use a different device, attempt to access restricted systems or are using a proxy service should all raise a red flag, or at least contribute to some cumulative factor of suspicion.

"If both their activity is an outlier as well as other elements you are tracking, ... then you should be more likely to suspect fraud," says Siegrist. "If you have an employee that normally does X, Y, and Z, and they are coming from a new location and doing things that they might not normally do, that should raise suspicions."

The least expensive way to monitor for such anomalies is to monitor log files and filter events using rules to detect abnormal behavior by users. Defining "abnormal" can be difficult, however. That's where systems that create fingerprints of standard users can come in handy. Alternatively referred to as adaptive analytics or adaptive authentication, the technology was first used by financial institutions to detect fraud on credit card accounts.

"Adaptive analytics is a state engine that watches what users are doing, and making sure that their patterns of behavior makes sense," says Darren Platt, chief technology officer with Symplified, an identity and access management company. "It's not just the applications they access, but the locations they are accessing from and what devices they are using when they access."

Don't just watch, do more
Companies should not stop at monitoring their access logs for signs of password abuse, however.

Starting with education, companies should teach their employees that each password should be complex and used only once. Companies should then create policies to enforce their security controls, including locking out accounts after a certain number of password attempts and adding authentication methods if anything appears suspicious.

In addition, companies should consider adopting two-factor authentication to lessen the chance that a compromise password will lead to a compromise of the corporate network.

Finally, companies that are monitoring their logs should make sure they have updated any detection rules for account access.

"Hackers are obviously going after password files and companies need to have systems in place that are monitoring the files," says Trustwave's Percoco. "Companies should take the time to tune them, so they can proactively see these attacks happening."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
6/21/2012 | 4:29:04 AM
re: Keep Watch On Accounts For Stolen Passwords
I agree that two-factor authentication bolsters security. Even that though has its flaws. For example the recent situation where the Google Apps' account recovery feature was exploited to hijack the account of the CEO of CloudFlare. That attack succeeded because -the attackers were able to fool AT&T into forwarding his voicemail to another account.
Brian Prince, InformationWeek/Dark Reading Comment Moderator-
Eric_Brown
50%
50%
Eric_Brown,
User Rank: Apprentice
6/11/2012 | 12:28:21 PM
re: Keep Watch On Accounts For Stolen Passwords


I have been a
strong supporter of 2FA for some time now, and I wish these sites and ones like
them would be more security conscious, not just say they are. They need to
prove it by actions, not words. -It would
be great to see them, just as so many other leading companies in their
respective verticals are doing by giving us the perfect balance between security
and user experience and moving to the use of 2FA (two-factor authentication) whether
mobile or other, as a form of a token where the user is asked to telesign into
their account by entering a one-time PIN code which is delivered to your phone
via SMS or voice. I enjoyed your article. These organizations need to start
being held responsible for their actions, and only way that will happen is if
we as user voice our opinion.
skswave
50%
50%
skswave,
User Rank: Apprentice
6/10/2012 | 1:36:24 AM
re: Keep Watch On Accounts For Stolen Passwords
The issue is it is time to move away from PW for most access control. the right choice is to use the TPM in your PC. Does SSL IPSEC, 802.1x, windows domain, Smart card emulation today.
You already have one in your business PC
It's industry standard
and it's very inexpensive to use 1/2 to 1/3 the cost of tokens

Only Known devices on the network is what makes it so cheap to run a carrier or a cable company compared to an enterprise thin 50 per year not 1000 per year for known devices with whitelisted software.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
The Yellow Brick Road to Risk Management
Andrew Lowe, Senior Information Security Consultant, TalaTek,  11/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: He hits the gong anytime he sees someone click on an email link.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29070
PUBLISHED: 2020-11-25
osCommerce 2.3.4.1 has XSS vulnerability via the authenticated user entering the XSS payload into the title section of newsletters.
CVE-2020-26212
PUBLISHED: 2020-11-25
GLPI stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.3, any authenticated user has read-only permissions to the planning of ever...
CVE-2020-26243
PUBLISHED: 2020-11-25
Nanopb is a small code-size Protocol Buffers implementation. In Nanopb before versions 0.4.4 and 0.3.9.7, decoding specifically formed message can leak memory if dynamic allocation is enabled and an oneof field contains a static submessage that contains a dynamic field, and the message being decoded...
CVE-2020-25650
PUBLISHED: 2020-11-25
A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path `/run/spice-vdagentd/spice-vdagent-sock` could use this flaw to perform a memory denial of service fo...
CVE-2020-29071
PUBLISHED: 2020-11-25
An XSS issue was found in the Shares feature of LiquidFiles before 3.3.19. The issue arises from the insecure rendering of HTML files uploaded to the platform as attachments, when the -htmlview URL is directly accessed. The impact ranges from executing commands as root on the server to retrieving se...