Transcript
Rick Howard (0:02)
You're listening to the Cyberwire Network powered by N2K.
Nyla Genoi (0:12)
Cyber threats are evolving every second, and staying ahead is more than just a challenge, It's a necessity. That's why we're thrilled to partner with ThreatLocker, the cybersecurity solution trusted by businesses worldwide. ThreatLocker is a full suite of solutions designed to give you total control, stopping unauthorized applications, securing sensitive data, and ensuring your organization runs smoothly and securely. Visit threatlocker.com today to see how a default deny approach can keep your company safe and compliant.
Melanie Mains (0:58)
The word is account takeover prevention spelled account as in an identity and list of access authorizations for a computer system takeover as in gaining unauthorized access and control and prevention as in stopping unauthorized access to a user account that belongs to someone else. The prevention of the first part of an intrusion kill chain model exploitation technique where the hacker steals valid login credentials from a targeted victim. Example sentence Account takeover Prevention is a 1514 billion dollar market that is growing significantly year over year. Origin and Context According to the Verizon 2021 Data Breach Investigations Report, 61% of cybercrime starts with compromised credentials. Bad actors capture victim passwords through a variety of techniques like credential stuffing, phishing and spear phishing, watering hole attacks, password spraying, key logging, brute force attacks, and local discovery. These attacks are so common that, according to Eliza Vigdorman, senior writer for Security.org, one in every five adults on the planet have been victims. Credential stealing is so popular because, compared to developing software exploits to take control of a system, hackers stealing passwords is relatively easier to accomplish. And once hackers have a valid credential, they can log into the targeted system as a legitimate user and not set off any alarm bells. Account takeover prevention can come in many forms. Most pundits agree that the single most useful countermeasure is some form of multi factor authentication, or MFA. According to Microsoft, this one step would prevent 99% of all account takeover attempts. Other countermeasures include monitoring for user ID and passwords sold in underground forums, using password managers to prevent simple passwords and password reuse, and perhaps going passwordless. As of 15th September 2021, you can sign into a Microsoft account with the Microsoft Authenticator app, Windows hello protocol, a security key, or an SMS email verification code instead of a password. According to Melanie Mains, senior product marketing manager at Microsoft, industry protocols such as WebAuthn and CTAP2, ratified in 2018, have made it possible to remove passwords from the equation altogether. These standards collectively known as the Fido 2 standard, ensure that user credentials are protected end to end and strengthen the entire security chain. NERD REFERENCE In Mr. Robot episode three, season one, Elliot, played by Rami Malek, sends his boss an email that includes a link to a fake website that looks amazingly like Evil Corps official website. Elliot created it using a software package called the Social Engineers Toolkit and a module within the toolkit called Credential Harvester. Both are real open source tools. Credential Harvester automatically copies a website and then hosts the fake version of it at an attacker specified location. Once Elliot's boss went to the fake website and entered his login credentials, Elliot collected those credentials and used them to legitimately login to his boss's account. Word Notes is written by Nyla Genoi, executive produced by Peter Kilpe and edited by John Petrick and me, Rick Howard. The mix, sound design and original music have all been crafted by the ridiculously talented Elliot Peltzman. Thanks for listening.
![account takeover prevention (noun) [Word Notes] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F5e6699a8-0e4e-11f0-ba23-97a0ed79d66b%2Fimage%2F441b0ca2db080b93b935568d381ce462.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)