Article Details
Scrape Timestamp (UTC): 2023-12-08 17:23:05.149
Original Article Text
Click to Toggle View
Privilege elevation exploits used in over 50% of insider attacks. Elevation of privilege flaws are the most common vulnerability leveraged by corporate insiders when conducting unauthorized activities on networks, whether for malicious purposes or by downloading risky tools in a dangerous manner. A report by Crowdstrike based on data gathered between January 2021 and April 2023 shows that insider threats are on the rise and that using privilege escalation flaws is a significant component of unauthorized activity. According to the report, 55% of insider threats logged by the company rely on privilege escalation exploits, while the remaining 45% unwittingly introduce risks by downloading or misusing offensive tools. Rogue insiders typically turn against their employer because they have been given financial incentives, out of spite, or due to differences with their supervisors. CrowdStrike also categorizes incidents as insider threats when they are not malicious attacks against a company, such as using exploits to install software or perform security testing. However, in these cases, though they are not used to attack the company, they are commonly utilized in a risky manner, potentially introducing threats or malware to the network that threat actors could abuse. Crowdstrike has found that attacks launched from within targeted organizations cost an average of $648,000 for malicious and $485,000 for non-malicious incidents. These figures may be even higher in 2023. Besides the significant financial cost of insider threats, Crowdstrike highlights the indirect repercussions of brand and reputation damages. A typical insider attack Crowdstrike explains that utilizing privilege escalation vulnerabilities to gain administrative privileges is critical to many insider attacks, as in most cases, rogue insiders start with low-level access to their network environments. Higher privileges allow the attackers to perform actions such as downloading and installing unauthorized software, wiping logs, or even diagnosing problems on their computer using tools that require administrator privileges. The most exploited flaws for local privilege escalation by rogue insiders are the following, according to CrowdStrike's observations: The above flaws are already listed in CISA's Known Exploited Vulnerabilities Catalog (KEV) as they have been historically used in attacks by threat actors. Even if a system has been patched for these flaws, insiders can gain elevated privileges through other means, such as DLL hijacking flaws in apps running with elevated privileges, insecure file system permissions or service configurations, or Bring Your Own Vulnerable Driver (BYOVD) attacks. Crowdstrike has seen multiple cases of exploitation of CVE-2017-0213 impacting a retail firm in Europe, where an employee downloaded an exploit via WhatsApp to install uTorrent and play games. Another case concerns a terminated employee of a media entity in the U.S. PwnKit exploitation was observed by an employee of an Australian tech company who attempted to gain administrative rights for computer troubleshooting purposes. An example of CVE-2015-1701 exploitation concerns a U.S. tech firm employee who attempted to bypass existing controls to install an unauthorized Java virtual machine. While almost all of these insider threat incidents would not be considered malicious attacks, they introduce risk by modifying how a device should run or by potentially running malicious or insecure programs on the network. Insider mistakes introduce risk Nearly half of the insider incidents recorded by Crowdstrike concern unintentional mishaps like exploit testing getting out of control, executing offensive security tools without appropriate protection measures, and by downloading unvetted code. For example, CrowdStrike says some incidents were caused by security professionals testing exploits and exploit kits directly on a production workstation rather than through a virtual machine that is segmented from the rest of the network. The analysts report that most cases of this kind involve tools like the Metasploit Framework and the ElevateKit, while the vulnerabilities introduced most often as a result of careless activities are the following: Introducing these flaws into corporate networks can increase the overall security risk by providing threat actors who already have a foothold in the network with additional vectors for exploitation. However, even more important, it is not uncommon for threat actors to create fake proof-of-concept exploits or security tools that install malware on devices. For example, in May, threat actors distributed fake Windows proof-of-concept exploits that infected devices with the Cobalt Strike backdoor. In another attack, Rapid7 discovered that threat actors were distributing fake PoCs for zero-day exploits that installed Windows and Linux malware. In both scenarios, installing the fake exploit on a workstation would allow initial access to a corporate network, which could lead to cyber espionage, data theft, or ransomware attacks.
Daily Brief Summary
Crowdstrike reports that over 50% of insider threats involve the use of privilege escalation vulnerabilities.
Privilege escalation is a key tactic for insiders, enabling them to perform unauthorized activities, including installing software and compromising logs.
Insider attacks are categorized into malicious intent, like financial motives or spite, and non-malicious incidents, such as installing software for troubleshooting.
Financial impact of insider incidents is significant, costing on average $648,000 for malicious and $485,000 for non-malicious events.
Rogue insiders often use vulnerabilities listed in the CISA Known Exploited Vulnerabilities Catalog (KEV), even if systems are patched.
Examples include using CVE-2017-0213 to install uTorrent and games, and PwnKit to gain administrative rights for troubleshooting.
Insider mistakes, such as mishandled exploit testing or downloading unvetted code, constitute nearly half of insider incidents, raising security risks.
Fake proof-of-concept exploits and security tools can introduce malware, providing threat actors with access to corporate networks.