{"id":24326,"date":"2022-06-22T06:39:55","date_gmt":"2022-06-22T10:39:55","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=24326"},"modified":"2022-06-22T06:39:55","modified_gmt":"2022-06-22T10:39:55","slug":"how-to-fight-malicious-privileged-user-attacks","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/how-to-fight-malicious-privileged-user-attacks\/","title":{"rendered":"How To Fight Malicious Privileged User Attacks"},"content":{"rendered":"<p data-ar-index=\"0\"><span style=\"font-weight: 400;\">With the severe damage privileged user attacks cause to organizations, avoiding security threats coming from malicious privileged users and the threats they pose to organizations is of vital importance.<\/span><\/p>\n<p data-ar-index=\"2\"><span style=\"font-weight: 400;\">Ponemon Institutes released a 2022 report saying that privileged user attacks surged by 44% in 2020, with the cost per attack pegged at $15.38 million.<\/span><\/p>\n<p data-ar-index=\"4\"><span style=\"font-weight: 400;\">A privileged user refers to an employee with\u00a0 access to highly sensitive company information, such as source codes, networks, and other technical areas. These higher privileges make sensitive data in the organization vulnerable.<\/span><\/p>\n<p data-ar-index=\"6\"><span style=\"font-weight: 400;\">Privileged users may obtain control of more systems or gain admin and root access until they have complete control of the entire environment. Depending on their objectives, it becomes simpler for them to control low-level user accounts and also expand their privileges.<\/span><\/p>\n<h2 data-ar-index=\"8\"><b>Ways privileged user threats can manifest<\/b><\/h2>\n<h3 data-ar-index=\"9\"><b>1. Credential exploitation<\/b><\/h3>\n<p data-ar-index=\"10\"><span style=\"font-weight: 400;\">A threat actor may figure out the system administrator\u2019s credentials as their accounts have more privileges to sensitive data and system files. Should a malicious privileged user access these credentials, these may now be subject to exploitation.<\/span><\/p>\n<h3 data-ar-index=\"11\"><b>2. Privileged vulnerability exploits<\/b><\/h3>\n<p data-ar-index=\"12\"><span style=\"font-weight: 400;\">Vulnerabilities refer to exploitable code, design, implementation, or configuration flaws for malicious attacks. The vulnerabilities a privileged user can exploit may impact the operating system, network protocols, apps, online apps, and infrastructure.<\/span><\/p>\n<h3 data-ar-index=\"13\"><b>3. Poorly configured systems<\/b><\/h3>\n<p data-ar-index=\"14\"><span style=\"font-weight: 400;\">Many configuration problems that a privileged user can exploit are mostly from poorly configured security settings which include using a default password for a system administrator, unauthenticated cloud storage exposed to the internet, and having newly installed software with the default security settings.<\/span><\/p>\n<h3 data-ar-index=\"15\"><b>4. Malware<\/b><\/h3>\n<p data-ar-index=\"16\"><span style=\"font-weight: 400;\">Privileged attackers with root access and proficiency with viruses and malware may likewise exploit a number of security loopholes in the organization\u2019s system configurations. Furthermore, using malware like trojans and ransomware may be easier for privileged users as they have root access to the system environment.<\/span><\/p>\n<h2 data-ar-index=\"18\"><b>How business organizations can stop privileged user attacks<\/b><\/h2>\n<h3 data-ar-index=\"19\"><b>1. Least privilege access<\/b><\/h3>\n<p data-ar-index=\"20\"><span style=\"font-weight: 400;\">Adopt the principle of least privileged access. This refers to an organizational security practice that supports limiting privileged users\u2019 access to only the data, system, and application pertinent to their role.<\/span><\/p>\n<h3 data-ar-index=\"21\"><b>2. Security policies should guide privileged users.<\/b><\/h3>\n<p data-ar-index=\"22\"><span style=\"font-weight: 400;\">Ensure that a privileged user security policy exists to guide what a privileged user can and cannot do, including sanctions for violations of security policies.\u00a0<\/span><\/p>\n<h3 data-ar-index=\"23\"><b>3. Implement periodic security monitoring.<\/b><\/h3>\n<p data-ar-index=\"24\"><span style=\"font-weight: 400;\">Create a security monitoring team that regularly monitors how all the privileged users use their access in relation to their roles.<\/span><\/p>\n<h3 data-ar-index=\"25\"><b>4. Implement multi factor authentication<\/b><\/h3>\n<p data-ar-index=\"26\">\n<p data-ar-index=\"27\"><span style=\"font-weight: 400;\">For more information, read the original story in Techrepublic. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the severe damage privileged user attacks cause to organizations, avoiding security threats coming from malicious privileged users and the threats they pose to organizations is of vital importance. Ponemon Institutes released a 2022 report saying that privileged user attacks surged by 44% in 2020, with the cost per attack pegged at $15.38 million. A [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24,381,361,16],"tags":[],"class_list":["post-24326","post","type-post","status-publish","format-standard","hentry","category-managed-services-outsourcing","category-operations","category-privacy","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/24326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=24326"}],"version-history":[{"count":1,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/24326\/revisions"}],"predecessor-version":[{"id":24327,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/24326\/revisions\/24327"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=24326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=24326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=24326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}