• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
time to ditch big brother accounts for network scanning

Time to Ditch Big-Brother Accounts for Network Scanning

You are here: Home / Latest Cyber Security Vulnerabilities / Time to Ditch Big-Brother Accounts for Network Scanning
December 21, 2021

Yaron Kassner, CTO and co-founder of Silverfort, discusses why applying all-looking at privileged accounts for checking is negative observe.

In almost each network, there is a very privileged company account remotely connecting to all pcs. These accounts are generally utilized by backup, security or monitoring alternatives. But employing these kinds of accounts to remotely login to programs on the network introduces unnecessary risk — it is a lousy exercise, and an avoidable one.

An attacker can effortlessly get benefit of these privileged accounts, as follows. 

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


To start with, the attacker obtains entry to a computer system in the network. This can be carried out by exploiting vulnerabilities, phishing, a provide-chain attack and a lot of other strategies. Then the attacker waits for the services account to join to the compromised computer system. When this occurs, the attacker steals the credentials of the services account, and hence obtains area administrator privileges. From this position ahead, it results in being incredibly difficult to halt the attacker from full domain takeover.

It is crucial to be aware that this scenario is not theoretical. This attack vector is really common, given that it is so simple to execute.

Numerous organizations are aware of this threat, and nonetheless they carry on to sustain these extremely privileged company accounts. Even providers that have been attacked this way will go on to use these company accounts. Which is simply because the backup, monitoring and security distributors depart them no decision – declaring which is the only way their solution functions.

But there are solutions. The most simple substitute is to have an agent on just about every personal computer make contact with the server for directions, fairly than allowing for the server to join to each computer system. 

In addition, the recommendations acquired from the server should really be minimal to the objective of the agent. For case in point:

  • A backup agent ought to be in a position to send out encrypted data files, but shouldn’t be able to accomplish the encryption by itself
  • A monitoring agent must be in a position to ship the CPU utilization of the pc, but not put in software on the computer system
  • A software package-update agent should really be ready to put in program on the laptop, but only software signed by the group or a trustworthy vendor. 

This way, an attacker that compromises a server would only be capable to complete selected actions on the network rather than have total accessibility, and an attacker that compromises a laptop in the network won’t be in a position to steal the server’s credentials to go laterally. 

This solution operates. It is already becoming utilised by lots of cloud-based mostly remedies since they inherently do not have obtain to on-premises environments. Owing to this “limitation,” they had been compelled to arrive up with much more protected techniques to remotely control equipment.

How to Reduce the Big-Brother Outcome

So as a lot as we need backup, security and checking abilities, it’s time to do away with above-privileged area assistance accounts. Below are various ideal methods to make this happen:

  • When evaluating a product, extensively assessment the permissions it makes use of, and whether they are essential
  • Also critique how the permissions are becoming utilised
  • Give desire to answers that pull configuration from a central spot more than remedies that remotely link to computer systems to configure them
  • Limit services accounts to the bare minimum entry they will need to perform their roles. This includes limiting their entry to unique IP addresses and hosts. If they require accessibility to all personal computers, limit their accessibility to only the appropriate interfaces
  • Monitor privileged-services accounts for any deviation from their approved actions.

By stating no to granting area admin privileges in which they’re not needed, businesses can near a significant and dangerous security gap in their attack surfaces.

Yaron Kassner is CTO and co-founder of Silverfort.

Appreciate supplemental insights from Threatpost’s Infosec Insiders local community by visiting our microsite.


Some areas of this short article are sourced from:
threatpost.com

Previous Post: «Cyber Security News US Sentences Money Launderer Linked to QQAAZZ
Next Post: Active Directory Bugs Could Let hackers Take Over Windows Domain Controllers active directory bugs could let hackers take over windows domain»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fronton IOT Botnet Packs Disinformation Punch
  • SIM-based Authentication Aims to Transform Device Binding Security to End Phishing
  • New Chaos Ransomware Builder Variant “Yashma” Discovered in the Wild
  • Open source packages with millions of installs hacked to harvest AWS credentials
  • DOE ‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌funds‌ ‌development of Qunnect’s Quantum Repeater
  • Cabinet Office Reports 800 Missing Electronic Devices in Three Years
  • Malware Analysis: Trickbot
  • Conti Ransomware Operation Shut Down After Splitting into Smaller Groups
  • US Car Giant General Motors Hit by Cyber-Attack Exposing Car Owners’ Personal Info
  • Microsoft Warns of Web Skimmers Mimicking Google Analytics and Meta Pixel Code

Copyright © TheCyberSecurity.News, All Rights Reserved.