How hackers get into corporate networks

Praetorian has released a report titled “How to dramatically improve corporate IT security without spending millions”, which sheds light on how to improve cybersecurity at companies.

“We spent countless hours analysing data to discover the “Top 5 Attack Vectors” used to compromise the networks of today’s leading organisations,” said Praetorian.

According to the report, the top four attack vectors are based on utilising stolen credentials.

“This is a serious problem because credential theft will always work as long as the credentials are valid.”

Credential theft is reliable, repeatable, and has a low likelihood of negative impact for an attacker.

Attackers can use credentials wherever they are allowed, even in places the users might not need or know about.

“This is why it is important to restrict access at the network level based on business requirements,” said Praetorian.

The top five attack vectors used between 2013 and 2016 as part of a complete corporate network compromise were:

  1. Weak Domain User Passwords – 66%
  2. Broadcast Name Resolution Poisoning (WPAD) – 64%
  3. Local Administrator Attacks (Pass the Hash) – 61%
  4. Cleartext Passwords Stored in Memory (Mimikatz) – 59%
  5. Insufficient Network Access Controls – 52%

More on security

NSA cybersecurity hack – this is what happened

This is how easy it is to steal your ADSL username and password

Latest news

Partner Content

Show comments

Recommended

Share this article
How hackers get into corporate networks