Employees have long been singled out as the weak link in the corporate security chain, but the finger of blame has fallen typically on phished communications and lack of awareness – today however, we see a new threat vector to corporate networks that comes with a serious multiplier effect. A recent study cracked almost one thousand UK organisations in a matter of weeks, based on running our program through a freely available and ever growing supply of compromised email addresses, hashed passwords and unfortunately, yet more poor security practices from employees.
People behave like people – this 2015 PwC report proved people are just as likely to cause a breach as malware for instance – people are time-poor, prone to memory failure and in need of context and cues for recall – they are unable to generate and remember unique passwords for the typical universe of 25 online applications they frequently use. So they cheat, they modify or often re-use the same password across their personal applications and you’ve guessed it – across their corporate accounts too.
From the hacker’s perspective, this online repertoire of applications is a candy store of possibility if just one password can be cracked – the prize here isn’t necessarily nefarious posting on Facebook pages, but using the same set of keys to access corporate cloud applications, email and systems. So what should the remedy be? Prevent users from accessing online applications? Outlaw home or personal internet use? No, what’s needed (in the absence of password-free security measures) is a rethink of corporate vulnerabilities from an attacker’s perspective.
Businesses have learned how to manage employee-related threats and vulnerabilities in a professional context, but few have considered how their employees’ personal online behaviour impacts their corporate security. Attackers on the other hand are rubbing their hands with the vastly extended attack surface that social media, personal email and a host of other applications presents as possible entry points to corporate systems. Hackers don’t respect perimeters, and users don’t either.
To draw attention to this fundamental miscalculation of the cybercriminal mindset and the breadth of opportunity it presents, we focused on the security no-mans-land between personal and professional passwords to demonstrate the efficacy of this type of attack vector.
With a sample of 1.5 million compromised email addresses and hashed passwords from the public internet, we scanned them to identify Outlook Web Application accounts, a total of 1,226 UK businesses. With 92% of passwords able to be cracked, and the industry benchmark of 77% re-use of passwords across multiple applications we very quickly identified 868 organisations that could be hacked right now through OWA. The hacker strikes gold once inside with the ability to write Outlook rules to phone home with data and access other areas of the network with ease. In our Lab Research, we found 0.5% of UK businesses are immediately at risk – staggering for one single, next to no-cost exploit.
The Problem With Passwords
There’s further evidence to suggest hackers are already exploiting the personal password vulnerability – in May, a security firm discovered a botnet built for the sole purpose of locating and using account credentials to gain entry into online bank accounts.
Hackers gravitate towards the biggest returns for minimum effort. The rate of compromised emails accumulating on the web, with 400 million posted in one mega-breach alone last month, suggests this type of attack will grow in significance. Certainly, recent breaches suggest a growing appetite for revealing email addresses amongst the cybercriminal community – just take Ashley Madison, Amazon and Vtech for starters.
With freely available supply and the multiplied potential from cracking any one of 25 personal applications with ease, security managers must rethink what they consider to be included inside their digital footprint – all of the possible entry points an attacker would look at if they really were focused on a target.
Hacking The Cybercriminal Mindset
The overlap between personal and professional security presents a new frontier for where (and whether) organisations establish a security perimeter. At the very least, security professionals should be careful not to underestimate the potential issues that supposedly benign elements of corporate IT can generate as the attack vector environment evolves.
Two-factor authentication may keep some applications safe, but it’s not a silver bullet where the overlap between corporate and personal passwords exists, and the bigger issue certainly won’t go away. Self-awareness, as ever in protecting your organisation from cyberthreats, is the first step to understanding how attackers will approach.
Most businesses build security architectures and processes around a threat model that reflects their own view of the world. Mapping your digital footprint gives you the attacker’s perspective on where and how they might attempt a compromise. Our research on OWA gives an insight into the new way attackers can strike gold and abuse the features within corporate applications for gain. Take a minute to tune in to how cybercriminals might look at your organisation – then ask yourself, what email and password credentials is your CEO using on LinkedIn?