How To Fight Malicious Privileged User Attacks

Share post:

With the severe damage privileged user attacks cause to organizations, avoiding security threats coming from malicious privileged users and the threats they pose to organizations is of vital importance.

Ponemon Institutes released a 2022 report saying that privileged user attacks surged by 44% in 2020, with the cost per attack pegged at $15.38 million.

A privileged user refers to an employee with  access to highly sensitive company information, such as source codes, networks, and other technical areas. These higher privileges make sensitive data in the organization vulnerable.

Privileged users may obtain control of more systems or gain admin and root access until they have complete control of the entire environment. Depending on their objectives, it becomes simpler for them to control low-level user accounts and also expand their privileges.

Ways privileged user threats can manifest

1. Credential exploitation

A threat actor may figure out the system administrator’s credentials as their accounts have more privileges to sensitive data and system files. Should a malicious privileged user access these credentials, these may now be subject to exploitation.

2. Privileged vulnerability exploits

Vulnerabilities refer to exploitable code, design, implementation, or configuration flaws for malicious attacks. The vulnerabilities a privileged user can exploit may impact the operating system, network protocols, apps, online apps, and infrastructure.

3. Poorly configured systems

Many configuration problems that a privileged user can exploit are mostly from poorly configured security settings which include using a default password for a system administrator, unauthenticated cloud storage exposed to the internet, and having newly installed software with the default security settings.

4. Malware

Privileged attackers with root access and proficiency with viruses and malware may likewise exploit a number of security loopholes in the organization’s system configurations. Furthermore, using malware like trojans and ransomware may be easier for privileged users as they have root access to the system environment.

How business organizations can stop privileged user attacks

1. Least privilege access

Adopt the principle of least privileged access. This refers to an organizational security practice that supports limiting privileged users’ access to only the data, system, and application pertinent to their role.

2. Security policies should guide privileged users.

Ensure that a privileged user security policy exists to guide what a privileged user can and cannot do, including sanctions for violations of security policies. 

3. Implement periodic security monitoring.

Create a security monitoring team that regularly monitors how all the privileged users use their access in relation to their roles.

4. Implement multi factor authentication

For more information, read the original story in Techrepublic.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, April 24, 2024 – Good news/bad news in Mandiant report, UnitedHealth admits paying a ransomware gang, and more

This episode reports on the danger of using expired open-source packages, a tool used by a Russian hacking group and passw

Google Play introduces new biometric verification with a user warning

Google has recently announced updates to the biometric verification process for Google Play purchases, aiming to bolster security...

Cyber Security Today, Week in Review for week ending Friday April 19, 2024

On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT d

Cyber Security Today, April 19, 2024 – Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more

This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways