Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

8/26/2020
10:50 AM
50%
50%

With More Use of Cloud, Passwords Become Even Weaker Link

Slow patching provides vulnerabilities to exploit. A lack of network segmentation allows unrestricted lateral movement. Yet a report surveying a year of penetration tests finds that passwords still top the list of what attackers use to compromise systems.

Passwords continue to be the top weakness exploited in penetration-testing engagements, with the collection of credentials a major part of internal, red team, and social engineering engagements, security firm Rapid7 states in a report published on Aug. 26.

While the increase in remote work has focused attackers on virtual private networks (VPNs) and cloud services in 2020, penetration-testing data from last year shows that many compromises were already focused on credentials as the best way to gain access to cloud infrastructure, the vulnerability management firm stated. Penetration testers' top technique for obtaining passwords included password spraying, offline password cracking, and man-in-the-middle attacks, with password spraying the top technique for external attackers, the company states in its "Under the Hoodie" report.

Too many companies continue to rely on users to pick good passwords and to not reuse them across services, and not enough companies have deployed multifactor authentication, says Tod Beardsley, director of research for Rapid7.

"You are entrusting your humans to pick passwords, and that is a way to tears," he says. "We have all these options for picking passwords ... so let the machine pick your passwords. While that puts all your eggs in one basket, we have gotten really good at protecting that one basket."

Passwords have been a perennial problem for both companies and consumers, and attackers have consistently focused on collecting credentials. Using data from 206 engagements conducted during the 12 months to June 2020, Rapid7 found that companies continue to leave their network and systems open to exploit from leaked or compromised credentials, with a quarter of external engagements resulting in the penetration testers gaining access to credentials, 7% finding weak password policies, and 6% allowing user enumeration.

Because of the importance of credentials in a world increasingly focused on remote work, password management — along with patch management and network segmentation — are necessary defenses that most companies need to improve, Beardsley says.

"If you had to pick one thing to fix, it should be password management," he says. "Obviously, you have to have good patch management processes, but as people are moving toward platform-as-a-service and more reliance on cloud, ... patching becomes part of what you are getting, and passwords and credentials become more important."

Penetration testing, where a security firm tests a client's defenses, has long been part of the process of establishing defenses and then testing them for weaknesses. The 1992 movie Sneakers, for example, features a penetration-testing firm that focuses more on the physical but also uses electronic measures to defeat defenses at banks and technology companies.

While the activity is now routine, the industry saw some controversy last year when two Coalfire Security employees were caught in a county courthouse during a penetration-testing engagement at state courthouses and charged with burglarycharges that eventually were reduced and then dropped. "The incident rocked the pentesting space," Rapid7 stated in its report. "Clearly, everyone involved in offensive security needs to strive to better explain the value of routine pentesting of our physical and virtual world."

The testing services continue to find significant issues. While poor password security is the most significant issue, inconsistent and delayed patching continues to be a problem as well. Companies are taking more than 90 days to patch half of the Internet critical systems, Beardsley says.

"We have to get better at rolling out critical patches," he says. "We need to get to a monthly cadence of patching systems."

After exploiting unpatched software, moving laterally across a network is the third most successful strategy for penetration testers, according to Rapid7's report. Techniques that use the Windows Management Instrumentation (WMI) service, PsExec — a telnet-like tool for remote access to Windows — or the Remote Desktop Protocol (RDP) are common ways for an attacker, and penetration tester, to extend their compromise to other machines on a network. The ransomware attacks WannaCry and NotPetya used the first two techniques to spread quickly through compromised networks in 2017 and 2018, the report notes.

"Most discussions of these worms focus on the EternalBlue exploits implemented but don't talk about the real reason why these worms are so effective: They use the same sophisticated techniques for lateral movement as real attackers and pen testers alike," the report states. "By recovering and reusing passwords on compromised systems, attackers can often flit from machine to machine in search of their ultimate targets."

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15208
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can ...
CVE-2020-15209
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one....
CVE-2020-15210
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. We have patched the issue in d58c96946b and ...
CVE-2020-15211
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices f...
CVE-2020-15212
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor. Users having access to `segment_ids_data` can alter `output_index` and then write to outside of `outpu...