Cybercrime

Identity-Based Attacks Soared in Past Year: Report

Identity-based attacks have soared in the past year, according to CrowdStrike’s 2023 Threat Hunting Report.

Identity-based attacks have soared in the past year, according to CrowdStrike’s 2023 Threat Hunting Report.

CrowdStrike on Tuesday released its 2023 Threat Hunting Report, warning that threat actors have doubled down on identity-based attacks over the past year.

The new report is based on data collected over a 12-month period — between July 1, 2022, and June 30, 2023 — and it covers several major topics, including identity threats, cybercrime group techniques and tactics, as well as Linux and macOS insights and trends.

According to CrowdStrike, 62% of interactive intrusions involved the abuse of valid accounts, and 34% of breaches involved the use of domain or default accounts. In addition, there was a 160% increase in attempts to collect secret keys and other credentials through cloud instance metadata APIs. Pass-the-hash attacks increased by 200% year-over-year. 

The biggest rise related to identity threats was observed in Kerberoasting attacks, which increased 583%, with a Russian-speaking ransomware group known as Vice Spider and Vice Society being responsible for 27% of all Kerberoasting attacks. 

Kerberoasting is a post-exploitation technique that involves the abuse of the Kerberos network authentication protocol. It can be leveraged for privilege escalation and lateral movement, and attacks are not easy to detect due to the fact that Kerberos is widely used and malicious activities blend with regular activity. 

“Windows devices use the Kerberos authentication protocol, which grants tickets to provide users access based on service principal names (SPNs). Kerberoasting specifically involves the theft of tickets associated with SPNs. These tickets contain encrypted credentials that can be cracked offline using brute-force methods to uncover the plaintext credentials,” CrowdStrike explained.

The cybersecurity firm observed a 40% year-over-year increase in interactive intrusions, with the technology sector being the most targeted for the sixth year in a row. The financial services industry saw the biggest increase in interactive intrusions, at more than 80%.

The most aggressive state-sponsored threat actors to target the financial sector operate on behalf of North Korea, CrowdStrike said.

Advertisement. Scroll to continue reading.

The latest threat report also shows a 147% increase in initial access broker ads on the dark web. There has also been an increase of more than 300% in the use of legitimate remote monitoring and management (RMM) tools. 

Related: Ransomware Attacks on Industrial Organizations Doubled in Past Year: Report

Related: Mandiant 2023 M-Trends Report Provides Factual Analysis of Emerging Threat Trends

Related: 33 New Adversaries Identified by CrowdStrike in 2022

Related Content

Cybersecurity Funding

Tel Aviv-based firm emerged from stealth with $7 million seed funding led by TLV Partners with participation from SNR and angel investors.

Funding/M&A

New York startup Oasis Security banks $35 million in a Series A extension round led by Accel, Cyberstarts, and Sequoia Capital.

Cloud Security

CrowdStrike says the acquisition of Flow Security will expand its cloud security capabilities with Data Security Posture Management.

Funding/M&A

Israeli late-stage startup Silverfort raises a whopping $116 million in new financing to scale its ambitions in the identity security space.

Funding/M&A

Seattle identity and authentication startup Oleria has attracted renewed interest from venture capital investors.

Funding/M&A

Delinea acquires Israeli startup Authomize to add identity threat detection and response (IDTR) technologies to its product portfolio.

Data Protection

San Francisco startup gets fresh capital from Battery Ventures to compete in the crowded identity and access management space.

Funding/M&A

Silicon Valley startup snags $20 million in new capital and announced plans to expand beyond traditional IT environments.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version