April 14, 2023 By Alan O Dwyer 3 min read

Information-stealing malware has become extremely pervasive in recent years. This malware harvests millions of credentials annually from endpoint devices and enterprises across the globe to devastating effects.

Using highly automated and orchestrated attack methods, threat actors and initial access brokers provide an endless supply of compromised credentials to cyber criminal syndicates who use those credentials as early points of entry into company networks, databases and critical online applications.

Due to evolving tactics and variants, this type of malware has proven to be highly evasive against many current security solutions. Most victim organizations only become aware of credential theft after those credentials appear for sale on dark market sites or as part of credential-based intrusions. Consequently, the overall mean time to detect (MTTD) allows ample opportunity for threat actors to put the stolen credentials to use, greatly increasing the likelihood of data access, network compromise or ransomware.

In times of ever-increasing risk, organizations must find new ways to protect their credentials against the plague of info-stealers.

An alternative solution

Knowing that information-stealing malware will likely bypass security tools and successfully steal user credentials, I recently proposed an alternative detection method.

CredInt is both OS and device-agnostic. It employs readily available technologies and a systematically created credential pair saved onto each end-user device. In addition, it also utilizes a web-accessible login portal used to initiate alert logic when those specific credentials are attempted.

Following the attack cycle

From the attacker’s perspective, the millions of credentials that are harvested will always require some validity checking (at scale) to verify that the stolen credentials are active and marketable. This becomes the reliable constant in the attack cycle where malicious activity can be instantly observed.

By purposely creating a unique credential pair tied specifically to an end-user device for immediate identification, the “CredInt” pair can be used to trigger an alert when attempted against a corresponding web portal registered for the specific credential combination.

Uses, limitations and expectations

The concept of CredInt poses no actual harm or risk to the end user or the organization that deploys this method. It only comes into action once attackers have already successfully extracted credentials and attempted to use them.

Additionally, this method is not overly complicated to deploy or manage. Current web-app technology could be tailored for this specific controlled functionality and to protect the anonymity of both the web portal and the backend collection servers. It is scalable and retroactively compatible with all devices.

In a traditional honeypot implementation, a system is purposely exposed to entice and attract attacker activity. Unfortunately, false positives are a frequent result. CredInt is different: it’s a detection method only. No direct interaction is expected or provided on the end user device. It is designed as an alerting function based on anticipated external attack-chain events of compromised credential validation.

CredInt will also provide incredibly high-quality cyber intelligence and forensic value on the identified victim machine. That data can be shared across other security platforms and internal security teams to further bolster protection.

Finally, many organizations run OTP or MFA and password manager authentication solutions to provide enhanced access controls. CredInt will still provide an observable security event if a victim machine suffers browser-sourced information-stealer malware, which may have gone undetected. This includes detection on devices that store other critical data such as Crypto Wallets, Tokens or API Keys.

It’s clear that organizations must start implementing new methods of securing their data. To combat info-stealing malware, CredInt proposes one possible solution.

More from Risk Management

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Ransomware payouts hit all-time high, but that’s not the whole story

3 min read - Ransomware payments hit an all-time high of $1.1 billion in 2023, following a steep drop in total payouts in 2022. Some factors that may have contributed to the decline in 2022 were the Ukraine conflict, fewer victims paying ransoms and cyber group takedowns by legal authorities.In 2023, however, ransomware payouts came roaring back to set a new all-time record. During 2023, nefarious actors targeted high-profile institutions and critical infrastructure, including hospitals, schools and government agencies.Still, it’s not all roses for…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today