January 14, 2015 By Shane Schick 2 min read

Many cybercriminals try to break into corporate networks by guessing passwords, but a recently discovered malware dubbed Skeleton Key may let them simply make up one of their own.

A post from Dell SecureWorks Counter Threat Unit provided details on the threat, which is specific to Microsoft’s Active Directory service. It was described as an in-memory patch that lets cybercriminals compromise a system that only uses single-factor authentication for things such as Web-based email or virtual private networks. Worse, users may still log in with their original passwords even as cybercriminals access their data.

As an article on ZDNet explains, Skeleton Key is particularly worrisome because it could let cybercriminals pose as legitimate users inside an organization. Given that so many IT security problems are traced to insiders or former staff members, this could make it more difficult to trace those who have stolen information via the malware after the fact.

Forbes published an account of how this malware may have first popped up at a company based in London. Apparently, those using it would employ simple yet specific aliases for those they were attacking. The malware could be dated back to almost three years ago.

On the other hand, anyone attempting to use Skeleton Key will need to start over again once someone with an infected ad server shuts it down and activates it again, The Register noted. He or she will also need a password that governs domain administration, but if this is available in any physical areas of the organization — such as an IT department cubicle — it is possible that cybercriminals could try the same trick multiple times.

Some chief information security officers believe they are already well-protected by intrusion detection systems and the like, but as Dark Reading pointed out, Skeleton Key doesn’t create network traffic, so these types of products won’t help. And if cybercriminals were to impersonate someone from human resources or the senior management team, there might already be an authorization in place to access the information of various personnel. This means IT departments might not be quick to raise any questions or concerns.

If nothing else, Skeleton Key might be a good conversation-starter about the need for multifactor (or at least two-factor) authentication. This could include a physical hardware token, Computer Business Review suggested, or perhaps a soft token deployed on a smartphone. Otherwise, the only way to know whether your organization has been affected by this malware is to conduct a thorough information audit.

More from

Security roundup: Top AI stories in 2024

3 min read - 2024 has been a banner year for artificial intelligence (AI). As enterprises ramp up adoption, however, malicious actors have been exploring new ways to compromise systems with intelligent attacks.With the AI landscape rapidly evolving, it's worth looking back before moving forward. Here are our top five AI security stories for 2024.Can you hear me now? Hackers hijack audio with AIAttackers can fake entire conversations using large language models (LLMs), voice cloning and speech-to-text software. This method is relatively easy to…

Another category? Why we need ITDR

5 min read - Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in providing visibility into. As identity threat detection and response (ITDR) technology evolves, one of the most common queries we get is: “Why do we need…

On holiday: Most important policies for reduced staff

4 min read - On Christmas Eve, 2023, the Ohio State Lottery had to shut down some of its systems because of a cyberattack. Around the same time, the Dark Web had a “Leaksmas” event, where cyber criminals shared stolen information for free as a holiday gift. In fact, the month of December 2023 saw more than 2 billion records breached and 1,351 disclosed security incidents, according to research from IT Governance — an increase of 332% and 187%, respectively, over the month of…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today