How Automation Can Help You Respond to Hacked Credentials Circulating the Dark Web – Security Boulevard

Much like the legitimate economy, the cybercriminal marketplace experiences ebbs and flows.

Current factors working against it include the ripple effects of COVID-19 and loss of trust due to increased law enforcement activity. But any remaining doubt as to the sheer magnitude of this shadow economy was officially shattered earlier this month when security firm Digital Shadows released research showing that some 15 billion with a b login credentials are circulating in the cybercriminal underground, the result of 100,000 breaches that have occurred in recent years. If they all are unique, the15 billion figure would compute to roughly two credentials for every person living on the planet.

When a data-loss incident occurs, the hijacked merchandise has to end up somewhere, and now it appears the supply of stolen usernames and passwords for everything from domain admin accounts to anti-virus software to bank accounts is stuffing the far recesses of the internet. Depending on the value of the account, credentials can fetch anywhere from a few bucks each to several thousand per entry.

Given the volume, it is likely a compromised business has or soon will cough up your personal information. But as a security professional, you can take steps to help offset the explosive rise of dark web credentials by a) not contributing to the problem and b) keeping your guard up against any stolen information being used against your organization all while ensuring maximum efficiency from your team. Automation is a big part of it.

Attackers commonly turn to phishing or malicious spam (such as keylogger) attacks to siphon credentials from their victims. Perhaps their aim is solely that: to pilfer someones login information as a way to commit account takeover fraud or business email compromise. In fact, the Digital Shadows audit turned up two million email addresses related to accounting departments. In other cases, attackers look to pry credentials to further a much larger agenda within a targeted organization, as these keys can permit them to move laterally with the goal of ransacking the database or installing sophisticated malware. You can respond by enlisting common-sense approaches for handling social engineering, as well instituting security automation to hasten and streamline your response to phishing and malware cases.

Free Guide: Top Security Playbooks

Employees can be their own worst enemy when it comes to keeping themselves and their employer safe from the tentacles of cybercriminals, especially now with a majority of them working remotely. Security awareness education is valuable, but employees alone cant be relied upon to make the right decisions all the time. Technology can help them along, including VPNs, password managers and two-factor authentication, as does restricting privileges to the minimum level of permissions needed to get their jobs done.

A Technical Guide to Remote Security Operations [Free Download]

Dark web monitoring services, which trawl the common locations from which stolen data is dumped or bought and sold, have become in demand in recent years by companies yearning for more visibility into the whereabouts of their employees or customers personal information. But the process of determining the legitimacy of the monitoring services findings, closing false positive cases and initiating account password resets or lockouts can be cumbersome and time consuming. Security orchestration, automation and response (SOAR) technology can help organizations overcome these pain points, while ensuring passwords arent exposed to analysts and dramatically reducing the time window in which criminals have to exploit the credentials. In addition, SOC personnel is freed up to work on strategic tasks, like hunting for active threats within the network.

Dan Kaplan is director of content at Siemplify.

The post How Automation Can Help You Respond to Hacked Credentials Circulating the Dark Web appeared first on Siemplify.

Recent Articles By Author

*** This is a Security Bloggers Network syndicated blog from Siemplify authored by Dan Kaplan. Read the original post at: https://www.siemplify.co/blog/how-automation-can-help-you-respond-to-hacked-credentials-circulating-the-dark-web/

See the original post here:

How Automation Can Help You Respond to Hacked Credentials Circulating the Dark Web - Security Boulevard

Related Posts

Comments are closed.