Initial access markets sell stolen credentials and other means of access to cyber criminals. This blog will cover some of the ways those credentials are stolen, as well as the techniques attackers use that information to target organizations. This is part two of our series on initial access markets; click here to read part one.
Many of today’s most prominent attack techniques can result in credential compromise. Some of the most common ways credentials are stolen include:
Using social engineering, fraud, and other devious tactics, adversaries trick employees into divulging their credentials and/or other personal information. Increasing commoditization of the cybercrime space has led to phishing toolkits and Phishing-as-a-Service as possible options for attackers to significantly streamline their efforts.
Security.org states that even a fairly complex password of eight characters or lower can be cracked in under a day. Advances in cybercriminal technology have made it even easier for attackers to brute force their way into an account. Unfortunately, despite an ongoing emphasis from security personnel on password hygiene best practices, people continue to use simple passwords (‘password123’ is still one of the most used passwords) that are easily compromised.
In a successful breach, attackers gain access to a wealth of data. Some may opt to capitalize on that data instantly, selling it through initial access markets or other such marketplaces. This could be either a way to make a quick buck or prevent an attacker from getting too deep into a network and exposing themselves. Others simply share this information as a way to show off their hacking prowess, sow discord, or promote cyber terrorism.
Obtaining software through illegal means may be cheaper than the alternative, but it comes with massive risks. Namely, many attackers use illegitimate software to pose as a legit, “cracked” version of known software and steal credentials. Otherwise, the phony applications may include malware in downloads, infecting a system with info-stealing software.
Infostealers passively collect information generated by an infected system, tracking actions and even keystrokes to gather critical data. This could range anywhere from confidential or financial information to any of the various passwords someone uses in their daily business.
Armed with purchased credentials, attackers have a variety of ways to capitalize on the information for their own gain, including:
The most basic technique available is using the credentials to log into accounts and wreak havoc. As poor password hygiene continues to be an issue in security, these credentials could affect both the account/system they’re directly associated, but also any number of other products or applications a user leverages. It’s apparent the potential windfall that could come out of even one set of compromised credentials. Multiply that across an entire initial access market and the result could be payday for an attacker—and ruin for the affected individuals.
For accounts that have MFA enabled, a set of credentials may not have the same weight as it would without. That doesn’t mean, however, that they can’t be used. By repeatedly attempting to use the credentials, attackers can flood the affected individual with MFA requests, be it through SMS, push notifications, or elsewise.
Continuously “bombing” a user with MFA requests has several outcomes. At minimum, it could lock them out of their account, an ultimately minor inconvenience. But, in worse cases, the user could inadvertently or otherwise accidentally approve one of the requests, granting the attacker access to their account.
Using one of the earlier methods or others, an attacker can ultimately use the purchased credentials to get into a user’s account and take it over. Depending on the system or application, the result could be minimal. But, for critical applications, or if the user is particularly high-profile, say a C-level or small business owner, attackers could verily hit the jackpot.
Account takeovers can dovetail into several different outcomes:
These techniques paint a grim picture as to the potential effects of credentials purchased through initial access markets. Thankfully, there are ways that you can defend yourself and your organization against them.
Read the final blog in the series to explore these defense tactics in detail.
To learn more about initial access markets, watch our webinar deep dive on the topic.