Sectrio

Privilege mining: 2021’s single biggest cybersecurity threat for enterprises

By Kiran Zachariah
March 23, 2021
Credential mining

With hackers deploying sophisticated breach tactics, the traditional way of keeping hackers outside the perimeter is no longer a viable strategy to prevent breachers. In the year 2020, based on the data we saw on the Dark Web, we were able to ascertain that stolen credentials and privileges were not just used but were being mined to maximize the footprint of a breach as well.

In June last year, a leading heavy equipment manufacturer in Europe was breached. Hackers used the stolen credentials to skim more credentials and finally access the Intellectual Property (IP) vault of this company which didn’t just have critical IP data but also credentials for other vaults holding joint IP with vendors. Needless to say, most of this information made its way into shady market places trading such information.

Privilege mining, wherein the hackers move horizontally and vertically across digital infrastructures using a series of credentials stolen on the go is now the biggest cyber threat out there. Tons of credentials and network information from previous breaches have created opportunities for hackers like never before. Even at a conservative scale, this information could be enough to sustain cyberattacks well into 2023.

It is therefore prudent to exercise diligence and caution and take the following steps immediately irrespective of your threat perception:

  • Reset passwords across the enterprise and accounts
  • Use multi-factor authentication
  • Segregate networks, deeply monitor zones of convergence between tech streams such IoT, Operational Technology and IT
  • Use a solution such as Subex Secure to protect all components of your infrastructure including devices, networks, and systems

Talk to us now to learn more about improving your cybersecurity posture to deter hackers

Schedule a demo

Key Points

Discover more with topics that matter to you most.

Get the latest news and insights beamed directly to you

Share

Key Points

Get the latest news and insights beamed directly to you

Share

Credential mining

Read More

Protecting your critical assets is only a few steps away

Scroll to Top