November 12, 2015 By Douglas Bonderud 3 min read

Privileged accounts represent a paradox for IT professionals: While high-level access is required for specific users to complete business-critical tasks and many take pride in earning this level of access, their login credentials make tempting targets for attackers looking to infiltrate corporate networks.

According to Threatpost, which was reporting on a recent CyberArk study, 88 percent of networks are at risk of being compromised through stolen and reused account information. Can companies find a solution that doesn’t impact performance and limits the risk of credential-based attacks?

Rising Concern

As noted by Channel Insider, 61 percent of CyberArk survey respondents said that privileged account takeover “was the most difficult stage of an attack to mitigate” — up a full 15 percent from 2014. Stolen accounts also ranked at the top of companies’ security concerns, with 38 percent listing them ahead of other threats like phishing (27 percent) and malware (23 percent).

Even more worrisome? Despite increasing awareness of the risks associated with privileged accounts, many companies remain overconfident in their ability to detect an attack “within days” of attackers breaching their network.

So what’s the real risk of a hacked admin account? Are the consequences so dire? Short answer: absolutely. The survey found that 40 percent of Windows hosts could lead to “complete compromise” if hacked, and that many of these hosts were “high risk,” meaning they can access more than 80 percent of the networks’ other credentials. If high-level account data is stolen and the theft goes undetected, cybercriminals can often use that information to compromise all Windows hosts on a system, effectively granting them unfettered access.

Risk Factors

If privileged accounts cause such problems for IT professionals, why not simply lock down the system altogether? Pursuing this avenue, however, leads to multiple problems. First is pushback from employees who believe they’ve earned the ability to access corporate data even if it’s not directly related to their work.

In addition, this kind of lockdown causes an IT bottleneck, with users constantly running into password bulwarks and unable to access data they need to complete assigned tasks. And when the role of IT shifts to password gatekeepers, other technology infrastructure suffers for lack of time. Simply put, the hit to performance isn’t worth the effort of eliminating privilege altogether.

A recent Blouin News article, however, suggested that the current model of admin account management — which sees IT and account holders equally responsible for securing access — isn’t working out. Fewer than half of those asked in a recent Dell survey said they logged the use of admin credentials, while just 26 percent of account holders changed their password on a monthly basis. Placing blame is also problematic: CyberArk found that 48 percent of respondents called out poor employee security habits while 29 percent argued that hacks were simply too sophisticated to counter.

The Role of IT Professionals

Some users need high-level access — CISO, security professionals and project managers come to mind — but every account with raised permissions is another potential access point for cybercriminals looking to compromise corporate networks. And with companies overestimating their ability to catch cybercriminals in the act, a new strategy is required — one that builds security from the bottom up rather than trying to secure accounts from the top down.

Ideally, it takes the form of role-based management that ties high-level oversight to high-value access. If IT professionals know when and where these credentials are used, it becomes a much simpler task to detect odd behavior or lock accounts.

Bottom line? It’s not worth playing the blame game or fighting with users to trim down their permissions bit by bit. With almost 90 percent of networks at risk, IT professionals are best served with investment in oversight — what happens on the network must be readily apparent to those tasked with managing IT risk.

More from

The major hardware flaw in Apple M-series chips

3 min read - The “need for speed” is having a negative impact on many Mac users right now. The Apple M-series chips, which are designed to deliver more consistent and faster performance than the Intel processors used in the past, have a vulnerability that can expose cryptographic keys, leading an attacker to reveal encrypted data. This critical security flaw, known as GoFetch, exploits a vulnerability found in the M-chips data memory-dependent prefetcher (DMP). DMP’s benefits and vulnerabilities DMP predicts memory addresses that the…

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today