news release

Report: Surge in Attacker Access to Privileged Accounts and Services Puts Businesses at Risk

Sorry, this news release has not been published yet, check back later!

March 3, 2020

SAN JOSE, Calif., Mar. 3, 2020 — Vectra AI, the leader in network threat detection and response (NDR) today announced that there is a major security gap that is obvious, important and urgent: the ability to know if privileged accounts and services are compromised. It is continuing proof that traditional access-based approaches that rely on one-time security gating decisions or predefined lists of privileged identities continue to fail.

Published in the Vectra 2020 RSA Conference Edition of the Attacker Behavior Industry Report and Spotlight Report on Privilege Access Analytics Report, the findings provide a first-hand analysis of active and persistent attacker behaviors from more than five million workloads and devices from customer cloud, data center and enterprise environments.

Key findings from the 2020 RSA Conference Edition of the Attacker Behavior Industry Report and Spotlight Report on Privilege Access Analytics :

  • Potentially malicious privilege access from an unknown host was the most common privileged access anomaly behavior observed, accounting for 74% of all privilege access anomaly behavior detections. These are similar to the behaviors found in the Capital One breach.
  • Finance and insurance, healthcare and education organizations exhibited the most privilege access anomaly behaviors. These three industries together account for almost half (47%) of all privilege access anomaly behavior detections.
  • Across all industries, 215 attacker behavior detections per 10,000 hosts were observed. This is lower than the 282 attacker behaviors per 10,000 hosts experienced in the first half of 2019.
  • Technology (138 detections per 10,000) and education organizations (102 detections per 10,000) remain the most common sectors to exhibit command & control behaviors, nearly 3 times more than the average across other industries.
  • Small companies (0 to 5,000 employees) are more at risk of lateral movement attacks. Small companies observed 112 lateral movement behaviors per 10,000 hosts, nearly twice that of medium and larger sized companies.

Notably, the reports highlights the importance of privileged access as a key part of lateral movement in cyber-attacks. Adversaries leverage privileged accounts to gain unauthorized access to the most critical assets that an organization relies on. It underscores the importance of continuous monitoring of user accounts, services and hosts once they gain access to and operate on the network so that security teams have the right information to take quick action against the malicious use of privilege across cloud and hybrid environments.

“The observations from this report reinforce the importance of visibility into privileged access and other attacker behaviors,” said Chris Morales, Head of Security Analytics at Vectra. “Combining data sources in the cloud with network data can stitch together a powerful combination of information that increases the likelihood of detecting and prioritizing post-compromise activities before a catastrophic breach occurs.”

Media contact

press@vectra.ai

Most recent news releases

Vectra Launches New Advisory and Operational Cybersecurity Services

July 21, 2020
Read news release

Vectra automatise encore davantage la réponse automatique aux menaces réseaux  avec sa solution phare Vectra Cognito

July 21, 2020
Read news release

Vectra lance de nouveaux services opérationnels et de conseil en matière de cybersécurité

July 21, 2020
Read news release

Report: Surge in Attacker Access to Privileged Accounts and Services Puts Businesses at Risk

Sorry, this news release has not been published yet, check back later!

March 3, 2020

SAN JOSE, Calif., Mar. 3, 2020 — Vectra AI, the leader in network threat detection and response (NDR) today announced that there is a major security gap that is obvious, important and urgent: the ability to know if privileged accounts and services are compromised. It is continuing proof that traditional access-based approaches that rely on one-time security gating decisions or predefined lists of privileged identities continue to fail.

Published in the Vectra 2020 RSA Conference Edition of the Attacker Behavior Industry Report and Spotlight Report on Privilege Access Analytics Report, the findings provide a first-hand analysis of active and persistent attacker behaviors from more than five million workloads and devices from customer cloud, data center and enterprise environments.

Key findings from the 2020 RSA Conference Edition of the Attacker Behavior Industry Report and Spotlight Report on Privilege Access Analytics :

  • Potentially malicious privilege access from an unknown host was the most common privileged access anomaly behavior observed, accounting for 74% of all privilege access anomaly behavior detections. These are similar to the behaviors found in the Capital One breach.
  • Finance and insurance, healthcare and education organizations exhibited the most privilege access anomaly behaviors. These three industries together account for almost half (47%) of all privilege access anomaly behavior detections.
  • Across all industries, 215 attacker behavior detections per 10,000 hosts were observed. This is lower than the 282 attacker behaviors per 10,000 hosts experienced in the first half of 2019.
  • Technology (138 detections per 10,000) and education organizations (102 detections per 10,000) remain the most common sectors to exhibit command & control behaviors, nearly 3 times more than the average across other industries.
  • Small companies (0 to 5,000 employees) are more at risk of lateral movement attacks. Small companies observed 112 lateral movement behaviors per 10,000 hosts, nearly twice that of medium and larger sized companies.

Notably, the reports highlights the importance of privileged access as a key part of lateral movement in cyber-attacks. Adversaries leverage privileged accounts to gain unauthorized access to the most critical assets that an organization relies on. It underscores the importance of continuous monitoring of user accounts, services and hosts once they gain access to and operate on the network so that security teams have the right information to take quick action against the malicious use of privilege across cloud and hybrid environments.

“The observations from this report reinforce the importance of visibility into privileged access and other attacker behaviors,” said Chris Morales, Head of Security Analytics at Vectra. “Combining data sources in the cloud with network data can stitch together a powerful combination of information that increases the likelihood of detecting and prioritizing post-compromise activities before a catastrophic breach occurs.”

Media contact

press@vectra.ai