Third-Party Compromised Credentials
đź“–Definition
Credentials in terms of cyber threat intelligence (CTI) refer to methods used to verify a users identity, commonly these are a username and password. These credentials are classified as compromised credentials when an unauthorized user gains possession of them.
Credentials in terms of cyber threat intelligence (CTI) refer to methods used to verify a users identity, commonly these are a username and password. These credentials are classified as compromised credentials when an unauthorized user gains possession of them. The persistence of this problem is unsurprising given the continued digitization of business operations; the weak, recycled passwords selected by users; and the high value placed on compromised credentials on the cyber underground due to the significant damage or disruption that can be caused by compromising them. As well as getting a handle on your own organization’s compromised credentials, those of your third-party services are another matter. Third party services are increasingly interconnected with the organizations they serve. They often share systems and data, but unfortunately they may not share the same strength of cybersecurity infrastructure. In turn, a third party service usually has its own third party services, resulting in a dizzying maze of online assets with varying security. Compromised credentials provide threat actors with an easy access point into the third party network, which they can use as a launch pad into targeting your own organization from which they can conduct malicious behavior such as deploying phishing campaigns, installing malware, and selling or destroying your data. 19% of breaches worldwide were caused by a compromised business partner. When the consequences of a compromised credential attack will blight both stakeholder trust and the bottom line, organizations must seek strategies for protecting themselves against compromised credential attacks from within their supply chain.
How Are Credentials Compromised?
Compromised credentials provide threat actors with the keys to the kingdom. The value of these credentials is so high that threat actors are relentless in exploiting this attack vector. Some of the most prevalent methods used are:
How Can You Combat It?
How can Intel 471 Help?
Bring visibility to third party risks. We provide unique Cyber Threat Intelligence (CTI) by augmenting automatic collection with a global network of analysts. The following capabilities allow us to swiftly help our customers defend against attacks stemming from third party compromised credentials.
Map an Attack Surface: Intel 471 will identify all known, unknown, and rogue assets within an attack surface. From a long-forgotten API endpoint to a misconfigured cloud storage bucket, you can locate all vulnerabilities that a threat actor might leverage to compromise credentials and alert your third parties to them.