Skip to content

Pass-the-hash – What it is and how to protect yourself?

Every day, we hear about cyberattacks against companies of all kinds. According to the 2019 Cost of a Data Breach Report, not only did the number of data leaks rise, but its cost as well. The average cost of a data leak, in the 507 organizations surveyed, was USD 3.92 million, an increase of 1.5% over the previous year. That’s right, and investments in cybersecurity have also increased, although the growth rate is lower today, according to Gartner. 

One of the techniques used by malicious attackers is the exploitation of flaws, which allows access to sensitive data and pass-the-hash. In this article, we discuss how this technique works, as well as the business risks involved, and how the Privileged Access Management (PAM) senhasegura tool can help organizations to prevent this type of attack.

The pass-the-hash attack technique has been around since the early 1990s and remains widely used by hackers to perform attacks. Although many organizations are adequately protected against pass-the-hash attacks, many have not taken any steps to protect themselves yet. Pass-the-hash occurs when a malicious agent steals privileged credentials by compromising the device. When a malicious attacker succeeds in performing this type of attack, they can quickly obtain the password hash of a domain admin credential. Thus, when the hash is compromised, the attacker is able to move laterally within the infrastructure and thus compromise other credentials and devices.

In this case, the attack needs Social Engineering skills to make the user click on a phishing email or infect a device with malware. When detecting the problem, the user will probably call the Technical Support team. Upon responding to the user’s request, the Support agent will use a privileged credential to authenticate into the device and check the problem. At this moment, the malicious attacker stores the administrative credentials used as a hash, even when the agent remotely accesses it. That’s it! With this hash, the attacker can use it to access IT resources within the affected organization’s infrastructure. It is no coincidence that the pass-the-hash attack is one of the most common attacks in the cybersecurity market.

It is worth remembering that, although it can be performed even on Linux and Unix devices, this type of attack is more common to occur on devices with the Windows platform installed. In this environment, pass-the-hash exploits the Single Sign-On feature of some authentication protocols such as NT Lan Manager (NTLM) and Kerberos. In this case, a malicious attacker is able to obtain private SSH keys and thus authenticate themselves on devices, in addition to moving laterally. 

On Windows platforms, when a password is created on a device, it is hashed in the memory of the Security Account Manager (SAM) and Local Security Authority Subsystem (LSASS) processes. Moreover, the Credential Manager process stores a database file in Active Directory, for example. Now that we know the dynamics of pass-the-hash attacks, the question that remains is: how do you protect yourself from this type of attack?

Many organizations implement actions based on best practices to protect themselves from pass-the-hash attacks. The separation of Domain Admin accounts is one of these actions. In this way, users with administrative credentials can have a common privileged credential, but without privileged access to the network. Therefore, it is possible to use Domain Admin accounts only when necessary, reducing the attack surface. Another good practice to mitigate the risk of these attacks is to make stronger password policies for this type of account. This involves not only the complexity of passwords, but the policies for changing and accessing credentials, including the frequency for changing passwords.

After implementing these best practices, the next step is to completely remove privileged access from devices connected to the infrastructure. This is because pass-the-hash attacks only occur when using these privileged credentials. One of the ways to achieve these results is through a Privileged Access Management (PAM) solution.

According to Gartner, PAM-related technologies provide secure privileged access in order to meet business requirements (auditing, for example). This is accomplished by protecting, managing, and monitoring privileged access and accounts. In addition to the controls associated with user access, technologies linked to PAM are also able to reduce cyber risks and the attack surface through the secure storage of credential passwords, both the personal and system ones. 

Accounts stored in a PAM solution are the most critical. In this case, many Information Security policies used in organizations may provide for complex requirements for these passwords, including their frequent changes. Regulatory requirements and cybersecurity best practices require that these passwords are unknown to most people within the organization. Thus, in addition to controlling connectivity to administrative systems, the features of a PAM solution will allow the management of access, the life cycle of privileged credentials, and the audit of privileged actions performed by these credentials. Finally, passwords can be rotated by the end of the respective accesses.

The functionalities of a PAM solution such as senhasegura, which help mitigate the risks associated with pass-the-hash attacks, include:

  • Role-based access controls: it allows the implementation of the least privilege concept, which brings greater control over users’ privileges. Consequently, it is possible to reduce the risks of a range of threats. The access granularity of senhasegura simplifies the implementation of least privilege models in Linux and Windows environments.
  • Access requests based on approval workflow: senhasegura allows the invocation of administrator privileges to run applications, considering the control by lists of authorized actions. Besides, one can also protect Linux and Windows systems through the configuration of approval workflows at one or multiple levels.
  • Windows features: access to Windows Control Panel operations with administrative privileges. Also, senhasegura allows the invocation of administrator privileges to access sensitive data shared on the network, thus ensuring the security of files and directories against threats.
  • Auditing and compliance: all requests for use of administrative credentials must be recorded in session logs, allowing for greater traceability of user actions and easier auditing of privileged activities and actions. 

When it comes to cybersecurity, the different components of the infrastructure may demand different solutions involved with PAM. Thus, it is recommended to use both Privileged Account and Session Management (PASM) and Privileged Escalation and Delegation Management (PEDM) solutions. While access and credential management requirements in isolated applications can be fulfilled with PASM, critical infrastructure such as server environments are best covered with PEDM solutions. Despite being different approaches, PEDM and PASM are complementary, allowing, as a consequence, the creation of a complete, secure, and reliable solution.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

NetJapan becomes Actiphy

Tokyo – On July 1, 2020 NetJapan, A Leading Publisher Of Backup, Disaster Recovery, And Virtualization Software Becomes Actiphy, Inc

Our state-of-the-art backup, disaster recovery, and virtualization technology, has been a leading software solution for nearly a quarter century. In changing our name to Actiphy we will expand our sales network with a renewed focus on global markets.

BACKGROUND

Founded in 1996, we began developing and distributing an image-based backup software solution. Since that time, we’ve introduced a number of leading-edge technologies to the Japanese markets. Our flagship product, ActiveImage Protector has become a major system backup and disaster recovery solution in the global markets.

As the use of big data accelerates, networks evolve, malware proliferates, AI, and IoT technologies emerge, the value of data backup and recovery increases exponentially. By taking advantage of our broad range of technologies, we will continue to innovate upon our existing data protection solutions.

As we continue to take on new challenges in the development of one-of-a-kind technologies to make a difference in the world we want our new company name, Actiphy, to reflect our determination to remain ”Swift, Active and Reliable”.

NEW COMPANY NAME AND LOGO DESIGN:

  1. The Name
    Actiphy is a portmanteau of the words Active and Rectify. Active meaning “engaged in progress, motion or action” and rectify meaning to “set right or make correct.”
  2. The Logo
    The logo color refers to “Fireman” red associated with rescue and disaster recovery.。

REFERENCES

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Actiphy
Actiphy founded in 2007, focuses on developing and offering innovative backup and disaster recovery solutions for complete protection of all your systems and data. ActiveImage Protector backs up Windows, Linux machines on physical and virtual environments and restore systems and data fast for you to be up and running with minimal downtime and data loss. Today Actiphy hold 20% of the image backup market in Japan and are expanding our services in the Asia/Pacific and North American regions, as well as in Europe, the Middle East and Africa.

AV-Comparative Release 2020

On June 30th, we got certified by AV-Comparatives for our parental control software. The certification recognizes anew the capability of SafeDNS to filter out undesirable content for children, e.g., pornography, violence, and the likes.

The test was carried during the month of June against 2000 websites deemed inappropriate for kids, which resulted in a block rate of 98.5% and 0 False-Positives. The full report can be found here. This follows our constant efforts to improve and keep the highest standards for the services we offer you.

Just in case you didn’t know: SafeDNS solutions can be operated with an extensive range of devices. Similarly, SafeDNS offers a wide spectrum of web-filtering categories. Thus, should you have more questions about the installation of our software or its web-filtering categories, kindly get in touch with our support@version-2.com.hk, they’ll be glad to help.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

2020日本遠距工作與資安面面觀

遠距工作(英:Telework, 日:テレワーク),對於員工、企業,帶來的好處摘要如下:

  • 對員工而言,遠距工作減少交通壅塞和意外,省下通勤時間,並降低碳足跡
  • 對企業而言,遠距工作可減少疾病傳播,減少辦公室成本、增強持續營運能力

日本政府近幾年推展遠距工作的力度,逐年增強且頗有節奏,這裡面有其時空背景。

2016年

里約熱內盧奧運會畢幕典禮,日本首相安倍接下奧運聖火,準備4年後舉辦2020年東京奧運會,東京的交通本來就非常繁忙,奧運期間將湧入大量運動選手、裁判、媒體、觀眾,對交通壅塞勢必雪上加霜。

2017年

日本政府和工商界合作開展全國性的工作方式改革運動,並且把東奧開幕日7月24日,訂定為“遠距工作日”(テレワーク・デイ),在當日,鼓勵企業和機關員工在早上10:30前,實施遠距工作,以避開上班尖峰時刻的交通堵塞。2017年,推行這個活動時,一共有922個機關團體參與。

2018年

有1,682個機關團體,計300,000人參加。

2019年

擴大自7月下旬至9月上旬一個多月,實施5天或更長時間,目標3,000個組織,總共 6百萬人參加。為了引導企業和機關能夠妥善因應遠距工作帶來的資安風險,日本總務省則於2018年4月,發行最新一版的”遠距工作資安指引”(テレワークセキュリティガイドライン)。

檢視日本總務省”遠距工作資安指引”各項主要對策,我們發現FineArt X-FORT電子資料控管系統,本身就擁有廣泛的對應機制與解決方案,摘要整理如下:

日本總務省”遠距工作資安指引”

X-FORT對應機制

(A)訂定遠距工作資安政策,引進資安技術,落實執行並定期稽核

X-FORT提供技術解決方案,記錄各種電腦操作行為,提供稽核人員的角色,方便落實稽核工作。

(B) 防範惡意軟體的對策

對應諸如勒索軟體之類的惡意軟體,在防火牆/防毒軟體這兩層保護之外,可藉由X-FORT FAC(Folder Access Control)防護重要資料夾,不被惡意軟體任意綁架,增加防禦縱深。

(C) 防止USB裝置丟失或被盜的對策

為防止USB裝置丟失或被盜,X-FORT提供寫出外接媒體加密的功能,萬一丟失或被盜,拾獲者也無法讀取加密檔案。

(D) 防止竊取重要信息的對策

這條指引的內容,建議使用者始終對機密資料進行加密。

X-FORT SVS資料加解密與權限控管,能全面滿足這項對策的要求。

(E) 防止未授權訪問的對策

遠距工作時,很容易將檔案傳到私人電腦或雲端硬碟,使得機密外洩的風險大幅增加。限制只有安裝X-FORT的電腦,才能存取網芳和NAS,可確實防止未授權的訪問和存取風險。

(F) 禁止使用外部服務
(SNS, social network service)的對策

X-FORT網頁控管模組可禁用SNS,只允許少數人員使用,但禁止上傳檔案,並且保留相關記錄,供日後查證。

2020年初,新冠病毒疫情爆發,造成全世界大流行,各國開始封閉實體疆界,班機停飛、郵輪停開,日本隨後在3月宣布2020年東奧延期一年,為因應疫情,進一步鼓勵企業和機關員工實施遠距工作。雖然東奧今年沒辦成,卻由於自2017年前期的宣導和推行遠距工作,並逐年擴大規模,使得日本政府在2020年,為因應新冠疫情,鼓勵企業讓員工遠距工作這項政策,能夠順勢推展開來。人口密集的東京,疫情尚在可控範圍,實屬不易,這應該與推行”遠距工作”,人員不用外出搭乘地鐵上班,間接降低感染風險,有很大的關聯性。

根據FineArt日本子公司同仁最新的回報,由於日本政府解除緊急狀態,在東京,6月下旬,通勤列車開始變得壅塞,也因而造成新冠病毒疫情有上升的趨勢,引發企業規劃繼續以遠距工作做為因應對策,只在有必要的時候,才讓員工進入辦公室工作。有些當地大型企業,推行遠距工作的目標,設定為員工7月以後到辦公室工作的機會減少80%,甚至有些公司訂為減少90%。從這個發展趨勢來研判,在日本當地,遠距工作的人數,必然將會持續增加,而遠距工作的資安解決方案,也必然會是持續發燒的剛性需求。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於精品科技
精品科技(FineArt Technology) 成立於1989年,由交大實驗室中,一群志同道合的學長學弟所組合而成的團隊,為一家專業的軟體研發公司。從國內第一套中文桌上排版系統開始,到投入手寫辨識領域,憑藉著程式最小、速度最快、辨識最準等優異特性,獲得許多國際大廠的合作與肯定。歷經二十個寒暑,精品科技所推出的產品,無不廣受客戶好評。

ESET Research dissects Evilnum Group as its malware targets online trading

BRATISLAVA, MONTREAL – ESET researchers are releasing their in-depth analysis into the operations of Evilnum, the APT group behind the Evilnum malware. According to ESET’s telemetry, the targets are financial technology companies – for example, platforms and tools for online trading. Although most of the targets are located in EU countries and the UK, ESET has also seen attacks in countries such as Australia and Canada. The main goal of the Evilnum group is to spy on its targets and obtain financial information from both the targeted companies and their customers.

“While this malware has been seen in the wild since at least 2018 and documented previously, little has been published about the group behind it and how it operates,” says Matias Porolli, the ESET researcher leading the investigation into Evilnum. “Its toolset and infrastructure have evolved and now consist of a mix of custom, homemade malware combined with tools purchased from Golden Chickens, a Malware-as-a-Service provider whose infamous customers include FIN6 and Cobalt Group,” he adds.

Evilnum steals sensitive information, including customer credit card information and proof of address/identity documents; spreadsheets and documents with customer lists, investments and trading operations; software licenses and credentials for trading software/platforms; email credentials; and other data. The group has also gained access to IT-related information, such as VPN configurations.

“Targets are approached with spearphishing emails that contain a link to a ZIP file hosted on Google Drive. That archive contains several shortcut files that extract and execute a malicious component, while displaying a decoy document,” elaborates Porolli. These decoy documents seem genuine, and they are continuously and actively collected in the group’s current operations as they try to compromise new  victims. It targets technical support representatives and account managers, who regularly receive identity documents or credit cards from their customers.

As with many malicious codes, commands can be sent to Evilnum malware. Among those are commands to collect and send Google Chrome saved passwords; take screenshots; stop the malware and remove persistence; and collect and send Google Chrome cookies to a command and control server.

“Evilnum leverages large infrastructure for its operations, with several different servers for different types of communication,” concludes Porolli.

For more technical details about the Evilnum malware and the APT group, read the full blog post “More evil: a deep look at Evilnum and its toolset” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.


About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

As with many malicious codes, commands can be sent to Evilnum malware. Among those are commands to collect and send Google Chrome saved passwords; take screenshots; stop the malware and remove persistence; and collect and send Google Chrome cookies to a command and control server.

“Evilnum leverages large infrastructure for its operations, with several different servers for different types of communication,” concludes Porolli.

For more technical details about the Evilnum malware and the APT group, read the full blog post “More evil: a deep look at Evilnum and its toolset” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.


About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×