Malware
Exposed Secrets: Unmasking Data Breaches, Stolen Credentials & Illicit Dark Web Bazaars
Infostealer malware is a significant and often underestimated threat to corporate information security teams. These malicious programs infect computers, steal credentials saved in browsers, along with active session cookies and other data, and send it back to the attacker’s command and control infrastructure. In some cases, the malware even self-terminates after completing its mission.
In this article, we’ll discuss how cybercriminals use stolen credentials to gain unauthorized access to privileged IT infrastructure, leading to data breaches and ransomware attacks. But infostealers aren’t the only threat; leaked credentials from more traditional sources continue to pose substantial risks to organizations.
It’s no secret that people often reuse the same password across multiple applications, creating a perfect opportunity for hackers to brute force their way into software-as-a-service (SaaS) and on-premises applications.
At IT Services, we currently monitor over forty million stealer logs. This number is growing by millions every month, with an expected increase in 2024. Additionally, we monitor over 14 billion leaked credentials found in data dumps across the dark web.
This unique perspective allows us to see firsthand how threat actors acquire, distribute, and use leaked credentials.
Understanding Leaked Credentials
To better comprehend leaked credentials, we can categorize them into tiers based on the method of leakage and the risk they pose to organizations. This approach, pioneered by Jason Haddix, helps security professionals clearly communicate credential leak risks to managers and corporate executives.
Tier 1 Leaked Credentials
Tier 1 leaked credentials result from third-party application or service breaches. When these breaches occur, all users of the affected service have their passwords compromised and distributed in a data dump on the dark web. This is the most common type of leaked credential.
For example, imagine a fictional corporation called Scatterholt with user logins for hundreds of thousands of consumers. If attackers breach Scatterholt and access the identity and access management system, they could steal these credentials and leak them onto the dark web.
Scatterholt could force a password reset for all users, but it’s likely that many users have reused the same password across other services. This leak gives threat actors the opportunity to use brute force techniques to gain access to other applications that share the same password.
Defending Against Tier 1 Leaked Credentials
Organizations can employ several well-researched defenses to reduce risk. First and foremost: monitor a leaked credentials database for corporate employee emails. This single action can make a massive difference as threat actors deliberately target passwords associated with corporate email addresses to facilitate data breaches.
Secondly, require users to routinely reset passwords on a schedule, ensuring that if a specific password is breached, they will have already rotated other corporate credentials.
Finally, we recommend using a password manager with a policy requiring employees to randomize passwords for various applications and store them securely, reducing the risk of employees making only minor changes to passwords.
The Special Case of Combolists
Combolists are collections of credential pairs, organized by service or geographically, used by cybercriminals in combination with brute force tools to attempt to gain access to various services.
These credentials often come from previous known breaches, stealer logs, or are entirely fabricated. The exact source is never entirely clear, but the sheer volume of credentials available through combolists, combined with frequent password reuse, makes them a significant attack vector.
Tier 2 Leaked Credentials
Tier 2 leaked credentials pose a unique risk to companies. These credentials are harvested directly from users through infostealer malware that steals all passwords saved in the browser.
We consider tier 2 leaked credentials to be of significantly increased risk to both the company and the user for the following reasons:
- A single stealer log will contain all of the credentials the user saved in their browser. This creates a perfect opportunity for threat actors to socially engineer the victim, the IT help desk, or even the company using the victim’s information.
- These logs contain the plain text username, password, and host for the credentials, often for hundreds of different logins. Threat actors have an enormous advantage when they can see dozens of password variations that the user uses.
- These logs often contain form-fill data with answers to secret questions, which can be effectively used to bypass websites with secret questions.
Tier 3 Leaked Credentials
This tier of leaks, also from stealer logs, poses an extreme risk to organizations. Fresh stealer logs often contain active session cookies, which threat actors can easily use for session hijacking attacks. In these attacks, they impersonate the victim and potentially bypass two-factor authentication (2FA) and multi-factor authentication (MFA) controls.
Discovering a fresh stealer log with corporate credentials should immediately prompt an incident investigation, as it’s highly likely that the passwords are working and that threat actors could directly access corporate resources.
Defending Against Tier 3 Leaked Credentials
Limit the time-to-live (TTL) for corporate applications to reduce the risk of session cookies remaining valid if distributed as a result of an infostealer infection.
Multi-Factor Authentication Isn’t a Silver Bullet
Not monitoring leaked credentials likely means that many of your employees use single-factor authentication, as their passwords may have been exposed. Many people believe that enabling 2FA is sufficient protection against stolen credentials, but the reality is that threat actors are aware of the obstacle 2FA presents and have developed techniques to overcome it.
Whether through social engineering of employees, using 2FA bots to capture one-time codes/passwords from victims, or even SIM-swapping, there are many ways to bypass MFA controls that are actively used in the wild.
The best defense against these types of attacks involves using authenticator apps, which feature temporary rotating codes instead of one-time passwords received via email or SMS. These applications are usually more secure and ensure that the user controls a second device to some extent.
Concerned about Credentials? We Can Help
IT Services monitors more than 14 billion leaked credentials distributed on the dark web and hundreds of millions leaked through infostealer malware.
Our platform sets up in 30 minutes and provides robust detection for leaked employee credentials across hundreds of forums, channels, and marketplaces.
Sponsored and written by IT Services.
Malware
Schneider Electric Confirms Dev Platform Breach: Hacker Seizes Sensitive Data in Bold Cyberattack
Schneider Electric has confirmed that its developer platform suffered a data breach, resulting in unauthorized access to product security vulnerability details. The breach was discovered on 10 August, after a hacker claimed to have stolen the data. Schneider Electric is working with security researchers to identify the individual responsible and the extent of the breach.
Imagine waking up one morning to find out that your entire database has been hacked, and critical information is now held hostage by a group of cybercriminals. That’s precisely what happened to Schneider Electric, a French multinational corporation known for its energy and automation products.
Unauthorized access to Schneider Electric’s data
A threat actor, who goes by the name “Grep,” recently taunted Schneider Electric on X, indicating they had breached the company’s systems. They claimed to have accessed Schneider Electric’s JIRA server using exposed credentials and scraped 400k rows of user data, including 75,000 unique email addresses and full names of the company’s employees and customers.
Schneider Electric confirmed the breach, stating that they were investigating a cybersecurity incident involving unauthorized access to one of their internal project execution tracking platforms. The company assured that its products and services remain unaffected by the breach.
A new hacking group emerges
Grep revealed to us that they had recently formed a new hacking group called the International Contract Agency (ICA), named after the game Hitman: Codename 47. Initially, the group didn’t extort companies they breached. However, upon discovering that the “ICA” name was associated with a group of Islamic terrorists, the threat actors rebranded themselves as the Hellcat ransomware gang and began developing an encryptor for future extortion attacks.
Extortion demands and a history of breaches
Grep is now extorting Schneider Electric, demanding $125,000 not to leak the stolen data and half of that amount if the company releases an official statement. This isn’t the first time Schneider Electric has faced a cybersecurity breach. Earlier this year, its “Sustainability Business” division fell victim to a Cactus ransomware attack, where the threat actors claimed to have stolen terabytes of data.
Don’t let this happen to you
As technology advances, so do the methods and tactics employed by cybercriminals. It’s essential to take cybersecurity seriously and invest in the right tools and strategies to protect your valuable data. Don’t wait until you become the next Schneider Electric. Instead, take action now to secure your digital assets and prevent a potential breach.
Keep coming back to learn more about the latest cybersecurity trends, tips, and best practices. We’re here to help you stay informed and protect your business from the ever-evolving world of cyber threats.
Malware
Cisco Ensures DevHub Site Leak Won’t Empower Future Breaches
Cisco has assured customers that a recent data leak from its DevHub site will not enable future cyber breaches. The leak exposed sensitive information, including users’ API keys, but Cisco has taken the necessary steps to mitigate the potential risks and protect its users’ security.
Recently, a threat actor managed to download non-public files from a misconfigured public-facing DevHub portal. Although this sounds alarming, we want to reassure you that the exposed documents do not contain information that could be exploited in future breaches of our systems.
What exactly was exposed?
Upon analyzing the exposed documents, we found that their contents include data that we publish for customers and other DevHub users. However, files that shouldn’t have been made public were also available, some belonging to CX Professional Services customers.
“So far, in our research, we’ve determined that a limited set of CX Professional Services customers had files included and we notified them directly,” we said.
Our teams have worked diligently to assess the content of those files. We want to emphasize that we have not identified any information in the content that an actor could have used to access any of our production or enterprise environments.
What actions have we taken?
We have since corrected the configuration and restored public access to the DevHub site. Additionally, we’ve confirmed that web search engines did not index the exposed documents.
This update comes after we confirmed last month that we took our public DevHub site offline (a resource center for customers where we publish software code, templates, and scripts) after a threat actor leaked what we described at the time as “non-public” data.
It’s important to note that we found no evidence that any financial data or personal information had been exposed or stolen from the public DevHub portal before it was taken offline.
What about the alleged access to a developer environment?
The threat actor behind the leak, IntelBroker, claimed that they also gained access to a Cisco JFrog developer environment through an exposed API token. While we maintain that our systems haven’t been breached, information shared by the threat actor indicates that they also breached a third-party development environment, allowing them to steal data.
We’ve been contacted with further questions about IntelBroker’s claims, but we have not replied as of yet.
What’s the takeaway from all of this?
While the exposure of non-public files is a concern, we want to reiterate that the information contained within those files does not put our systems at risk for future breaches. We have taken the necessary steps to correct the configuration issues and restore access to our DevHub site, ensuring that such an incident doesn’t occur again.
As always, your security is our top priority. We encourage you to reach out to us with any questions or concerns, and keep coming back to learn more about how we’re working to protect your data and keep you safe.
Malware
Interbank Admits to Data Breach After Unsuccessful Extortion Attempt and Massive Information Leak
Peruvian Interbank confirms a data breach after refusing to pay extortion demands. The hackers leaked customer information, but the bank assures no financial data was compromised. Interbank warns clients of potential phishing attacks and urges them to be cautious when providing personal information.
Imagine waking up one day to find your personal and financial information plastered all over the internet. It’s a nightmare scenario, isn’t it? Well, that’s precisely what happened to a group of customers at Interbank, one of Peru’s leading financial institutions, which serves over 2 million people.
Interbank confirms data breach
Interbank recently confirmed that a data breach occurred, with a hacker gaining unauthorized access to its systems and leaking stolen data online. The bank immediately deployed additional security measures to protect its clients’ operations and information. While their online platforms and mobile app experienced temporary outages, Interbank has assured customers that their deposits are safe and that most of their operations are back online.
Stolen data for sale on hacking forums
As if the breach wasn’t bad enough, a threat actor with the handle “kzoldyck” has been spotted by Dark Web Informer selling the stolen data on several hacking forums. The data in question includes customers’ full names, account IDs, birth dates, addresses, phone numbers, email addresses, IP addresses, and sensitive financial information like credit card numbers, CVV codes, and even plaintext credentials.
The hacker claims to have information on more than 3 million customers, with a total data cache of over 3.7 terabytes. They also mention possessing internal API credentials, LDAP, and Azure credentials. It’s worth noting that the hacker reportedly attempted to extort Interbank’s management two weeks prior, but the bank refused to pay.
So, what can you learn from this?
As a U.S. reader, you might be thinking, “That’s terrible, but it’s in Peru, so it doesn’t affect me.” Unfortunately, that’s not the case. Cybersecurity threats know no borders, and hackers are constantly seeking out new targets. In fact, data breaches have become increasingly common in recent years, with a 2021 report from the Identity Theft Resource Center showing a 17% increase in publicly reported data breaches in the U.S. compared to 2020.
This case serves as a stark reminder that no one is immune to the dangers of cyber threats. It’s essential to stay vigilant and educate yourself on how to protect your personal and financial information. Consider working with IT Services who can provide you with guidance and resources to stay one step ahead of the hackers.
Don’t let this happen to you
Be proactive in safeguarding your data and take the necessary steps now to protect your information. Reach out to us at IT Services to learn more about how we can help you and your business stay safe in this digital age. Remember, the best defense is a good offense, so don’t wait for a data breach to happen before taking action.
-
Malware1 year ago
Flagstar Bank’s Latest Data Breach: 800,000 Customers Impacted, Marking the Third Incident of 2021
-
Malware1 year ago
Blackbaud: Taking Responsibility with a Landmark $49.5 Million Settlement for Devastating Ransomware Data Breach
-
Data Protection Regulations12 months ago
Top Data Protection Officer Certification Courses Reviewed
-
Data Protection Regulations12 months ago
Top 11 Data Protection Training Programs for Compliance
-
Security Audits and Assessments12 months ago
Mastering Healthcare Data Security: 5 Essential Audit Tips
-
Data Protection Regulations12 months ago
Navigating Data Protection Laws for Nonprofits
-
Data Protection Regulations12 months ago
9 Best Insights: CCPA’s Influence on Data Security
-
Security Audits and Assessments12 months ago
HIPAA Security Risk Assessment: Essential Steps Checklist