How To Fight Malicious Privileged User Attacks

Share post:

With the severe damage privileged user attacks cause to organizations, avoiding security threats coming from malicious privileged users and the threats they pose to organizations is of vital importance.

Ponemon Institutes released a 2022 report saying that privileged user attacks surged by 44% in 2020, with the cost per attack pegged at $15.38 million.

A privileged user refers to an employee with  access to highly sensitive company information, such as source codes, networks, and other technical areas. These higher privileges make sensitive data in the organization vulnerable.

Privileged users may obtain control of more systems or gain admin and root access until they have complete control of the entire environment. Depending on their objectives, it becomes simpler for them to control low-level user accounts and also expand their privileges.

Ways privileged user threats can manifest

1. Credential exploitation

A threat actor may figure out the system administrator’s credentials as their accounts have more privileges to sensitive data and system files. Should a malicious privileged user access these credentials, these may now be subject to exploitation.

2. Privileged vulnerability exploits

Vulnerabilities refer to exploitable code, design, implementation, or configuration flaws for malicious attacks. The vulnerabilities a privileged user can exploit may impact the operating system, network protocols, apps, online apps, and infrastructure.

3. Poorly configured systems

Many configuration problems that a privileged user can exploit are mostly from poorly configured security settings which include using a default password for a system administrator, unauthenticated cloud storage exposed to the internet, and having newly installed software with the default security settings.

4. Malware

Privileged attackers with root access and proficiency with viruses and malware may likewise exploit a number of security loopholes in the organization’s system configurations. Furthermore, using malware like trojans and ransomware may be easier for privileged users as they have root access to the system environment.

How business organizations can stop privileged user attacks

1. Least privilege access

Adopt the principle of least privileged access. This refers to an organizational security practice that supports limiting privileged users’ access to only the data, system, and application pertinent to their role.

2. Security policies should guide privileged users.

Ensure that a privileged user security policy exists to guide what a privileged user can and cannot do, including sanctions for violations of security policies. 

3. Implement periodic security monitoring.

Create a security monitoring team that regularly monitors how all the privileged users use their access in relation to their roles.

4. Implement multi factor authentication

For more information, read the original story in Techrepublic.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways