Privilege Elevation Exploits Used in Over 50% Of Insider Attacks
Cyber Security Threat Summary:
A report published by Crowdstrike researchers indicates that insider threats are escalating, with Crowdstrike’s report indicating a surge in unauthorized actions using privilege escalation flaws. Approximately 55% of these threats leverage privilege scalation exploits, while 45% stem from downloading risky tools or misusing them. Motivations for insiders include financial incentives, grudges or conflicts with supervisors. The financial impact of these insider threats is staggering, averaging $648,000 for malicious and $485,00 for non-malicious incidents, potentially higher in 2023.
Critical to these attacks is gaining administrative privileges through flaws like CVE-2017-0213, CVE-2022l-0847 (DirtyPipe), CVE-2021-4034 (PwnKit), and others. These vulnerabilities, even listed in CISA’s Known Exploited Vulnerabilities Catalog, enable unauthorized software installs, log wiping, or diagnostic actions with elevated privileges. Even patched systems remain vulnerable through DLL Hijacking, insecure permissions, or Bring Your Own Vulnerable Driver attacks. Crowdstrike has seen multiple cases of exploitation of CVE-2017-0213 impacting a retail firm in Europe, where an employee downloaded an exploit via WhatsApp to install uTorrent and play games. Another case concerns a terminated employee of a media entity in the U.S.
Security Officer Comments:
However, nearly half of the insider incidents recorded by Crowdstrike concern unintentional mishaps like exploit testing getting out of control, executing offensive security tools without appropriate protection measures, and by downloading unvetted code. An example researchers detailed was security professionals testing exploits and exploit kits directly on a production workstation rather than through a virtual machine that is segmented from the rest of the network. Introducing these flaws into corporate networks can increase the overall security risk by providing threat actors who already have a foothold in the network with additional vectors for exploitation.
Suggested Correction(s):
By implementing these best practices, organizations can significantly reduce the risk of insider threats and protect themselves from potential harm.
Link(s):
https://www.bleepingcomputer.com/
https://www.crowdstrike.com/blog/