Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

8/18/2015
08:05 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

75% of Hackers Say Privileged Accounts Are Still Easy to Compromise

Thycotic Black Hat 2015 Hacker Survey also finds 94% of hackers have found privileged account credentials in unprotected files

WASHINGTON, D.C. – August 17, 2015 – Thycotic, a provider of smart and effective privileged account management solutions for global organizations, today announced the results of a survey of 201 white hat and black hat hackers at Black Hat USA 2015. The survey, which was conducted live on August 5th at the conference venue in Las Vegas, found that a majority (75%) of hackers have not seen a fundamental change in the level of difficulty in compromising privileged account credentials, despite an overall increase in IT security spending over the past two years.   

Request the executive summary report here.

Among other topics, the survey also asked hackers how often they come across privileged account credentials in unprotected files like spreadsheets. Only 6 percent of respondents said they had never seen this, meaning 94% find privileged credentials in unprotected files at least some of the time. 

Other key findings from the survey include:

·      Hackers indicated that privileged account credentials are the best targeted assets for gaining direct access to large amounts of critical data. 45% identified privileged credentials as their favorite target, while only 33% chose end user credentials as the easiest way to get what they are after.

·      9 out of 10 respondents said it is as easy or even easier to compromise privileged account credentials now than it was two years ago

·      Healthcare organizations were indicated (29%) to be the primary target for breach vulnerability, followed by financial services companies (25%) and government organizations (24%). 

“Perhaps not surprising to those in the cybersecurity industry, it is apparent that for all the new defensive solutions that have been introduced, we still haven’t cracked the code on how best to protect mission-critical data and company secrets, and in fact, in some cases we’re only adding additional layers of complexity which provide attackers more attack vectors to use to break in,” said Nathan Wenzler, senior technology evangelist at Thycotic. “It’s also clear from the data that even some of the most basic security practices are still not being enforced well enough by organizations and privileged login credentials are constantly left vulnerable to intruders.”

Alex Parks

Davies Murphy Group, Inc.
200 Wheeler Road, Burlington, MA 01803 USA
Office: +1 (617) 784-8863

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25782
PUBLISHED: 2021-01-28
An issue was discovered on Accfly Wireless Security IR Camera 720P System with software versions v3.10.73 through v4.15.77. There is an unauthenticated stack-based buffer overflow in the function CNetClientManage::ServerIP_Proto_Set during incoming message handling.
CVE-2020-25783
PUBLISHED: 2021-01-28
An issue was discovered on Accfly Wireless Security IR Camera System 720P with software versions v3.10.73 through v4.15.77. There is an unauthenticated heap-based buffer overflow in the function CNetClientTalk::OprMsg during incoming message handling.
CVE-2020-25784
PUBLISHED: 2021-01-28
An issue was discovered on Accfly Wireless Security IR Camera System 720P with software versions v3.10.73 through v4.15.77. There is an unauthenticated stack-based buffer overflow in the function CNetClientGuard::SubOprMsg during incoming message handling.
CVE-2020-25785
PUBLISHED: 2021-01-28
An issue was discovered on Accfly Wireless Security IR Camera System 720P with software versions v3.10.73 through v4.15.77. There is an unauthenticated stack-based buffer overflow in the function CFtpProtocol::FtpLogin during the update procedure.
CVE-2020-0237
PUBLISHED: 2021-01-28
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.