Sunday, December 1, 2024

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Identity & Access Security Bloggers Network 

Home » Security Bloggers Network » Disorder in the Court: Unintended Consequences of ATO

SBN

Disorder in the Court: Unintended Consequences of ATO

by Enzoic on November 19, 2024

The most common ATO threat that individuals and businesses imagine affecting them is their accounts getting hijacked- e.g. a threat actor uses credential stuffing to login to your netflix account, and enjoys some free entertainment on your dime (or sells the account for a few dollars)…or in a more serious scenario, accesses an employee’s corporate email to send phishing emails to other employees and gain access to the internal network to install ransomware.

But why would you worry about ATO happening to people who have nothing to do with you?

A recent FBI alert (as reported by Brian Krebs) highlighted an interesting and dangerous consequence of account takeover (ATO). As the FBI alert states, “cybercriminals are likely gaining access to compromised US and foreign government email addresses and using them to conduct fraudulent emergency data requests.” These email accounts are then used to make Emergency Data Requests, a type of legal requisition for information or action that bypasses much of the usual authorization process. The personal information obtained can be used for scamming, but the FBI warns that these requests can also be used to freeze and seize bank and cryptocurrency accounts.

While social engineering isn’t usually part of our immediate purview in the world of compromised credential research, these scams begin with a compromised email account from a government or law enforcement agency, which come from “mostly email-based phishing, and credentials that are stolen by opportunistic malware infections and sold on the dark web” according to Krebs’ article. It’s worth noting that the agency itself does not have to be compromised: because of credential and password reuse, cybercriminals may be able to take over an account merely because someone used their work email for something like a Spotify account, or to sign up for a gym membership, and re-used a compromised password.

Newsletter
AWS Hub
Predict 2025

Consequences of ATO: How to Hack Your Password

We may not be social engineers here at Enzoic (well, except perhaps the researchers assigned to infiltrate cybercrime forums), but we do know passwords. It may seem like a simple concept, but the amount of perpetuated misunderstanding around passwords out there belies the idea that even many cybersecurity experts really understand user behaviors and vulnerabilities. Every year we see at least a few types of “most popular password” lists, which rarely provide any new information, and can create a false sense of security.  For example, the Identity Theft Resource Center’s Weekly Breach Breakdown on November 1st of this year repeated some misleading statistics and some dangerous advice on choosing passwords from sources that one would expect to be highly reputable. They reference this list of ‘most common passwords’ for 2024, which informs us that the most common password in 2024 is ‘123456’. But what does this actually mean?

If organizations and users are protecting themselves appropriately, then we have no way of knowing what the most used passwords are. These types of statistics are highly susceptible to confirmation bias, in that the weakest passwords are compromised the most, and thus most prevalent when looking for compromised passwords.

Compromised credentials are also constantly shared and re-shared in ever-larger aggregated lists that include passwords from decades ago, so if we count these each time we see them, the ones that have been around the longest will seem most prevalent. These days, the reality is that, even though password complexity requirements have been discredited and dropped by NIST, most applications have requirements that would no longer allow 123456. So all these ‘top passwords’ lists do is provide a false sense of security.

Myths About Password Cracking Timeframes

The podcast also repeats claims that ‘a 12-character password with just lowercase letters will take 1,000 years to crack.’ This is a rather arbitrary number that varies enormously depending on the type of hashing algorithm and amount of computing power used, but what it actually refers to is the amount of time required to calculate all possible combinations, i.e. to crack every possible lowercase 12-character password. The reality is far different. We humans are notoriously terrible at choosing passwords: we overwhelmingly use words from our native language, letter combinations that make pronounceable sounds, and strings that are easy to type on a QWERTY keyboard layout. This vastly reduces the actual amount of character space that is most likely to be used for passwords, and thus means that a non-random password stands the risk of being cracked much, much faster.

And due to password re-use, one of the first techniques that hackers try for password cracking is to use lists of previously compromised passwords (research indicates over 8 billion unique passwords). As so many have already been compromised, even things that far exceed the typical “complexity” requirements are likely to be extremely susceptible to fast cracking (if not outright vulnerable to credential stuffing).

Avoiding Dangerous Password Advice

The most dangerous piece of advice provided in the podcast is that your password should be “something you can remember.” As a general rule, the easier your password is to remember, the easier it is to crack, and the more likely it is to be susceptible to account takeover. The best passwords are next-to-impossible to remember in that they are highly random, and do not exhibit any of the patterns that make things easy for humans to remember. If you cannot make use of a secure password manager (not a browser-based password manager!) and must memorize your password, make sure that it is quite long, e.g. based on a phrase instead of a single word, and makes use of a wide array of numbers, symbols, and capital letters- not just a lone exclamation point, or number sequences like 123.

FAQs

1. What are the most dangerous consequences of ATO for individuals and businesses?
The consequences of ATO can range from personal account hijacking, such as unauthorized access to streaming services or social media accounts, to more severe impacts like corporate email breaches. In corporate scenarios, ATO can lead to phishing campaigns, ransomware attacks, or unauthorized Emergency Data Requests, which may result in the freezing of bank and cryptocurrency accounts.

2. How can social engineering amplify the consequences of ATO?
Social engineering plays a significant role in ATO by leveraging compromised email accounts from trusted organizations, such as government or law enforcement agencies. These attacks often exploit reused passwords or phishing schemes, enabling cybercriminals to conduct fraudulent activities like Emergency Data Requests or scamming individuals with stolen personal data.

3. What are the best practices to avoid the consequences of ATO?
To mitigate the consequences of ATO, avoid reusing passwords across accounts, use a secure password manager to create complex and unique passwords, and regularly monitor accounts for compromised passwords. Businesses should enforce strong cybersecurity practices, including multi-factor authentication, automated tools to remediate compromised passwords, and regular employee training to recognize phishing attempts and other ATO tactics.

 

AUTHOR


Dylan Hudson

Dylan leads the Threat Research team at Enzoic, developing and implementing cutting-edge threat intelligence infrastructure to help protect users and organizations from cyberattacks. When not at work, he can be found hiking and biking in the Rocky Mountains or playing traditional Celtic music on various stringed instruments.

*** This is a Security Bloggers Network syndicated blog from Blog | Enzoic authored by Enzoic. Read the original post at: https://www.enzoic.com/blog/disorder-in-the-court-unintended-consequences-of-ato/

November 19, 2024November 19, 2024 Enzoic 0 Comments account takeover, Password Security, Threat Intel
  • ← Why Shadow APIs provide a defenseless path for threat actors
  • Unraveling Raspberry Robin's Layers: Analyzing Obfuscation Techniques and Core Mechanisms →

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Mobility Field Day

Upcoming Webinars

Hacker Tactic: Avoid Blind Spots with Your Windows Event Logs
Simplifying Network Access: Secure Modern Connectivity with Tailscale
Staying Ahead: Top Internet Trends Shaping Networking and Security
DevSecOps “Friends”, Webinar Series: The One with Platform Engineering (and the Happy Developers)
Managing Dependencies at Enterprise Scale

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

Interpol, African Nations Arrest 1,006 in Sweeping ‘Operation Serengeti’
Protecting Web-Based Work: Connecting People, Web Browsers and Security
Exabeam Allies With Wiz to Integrate CNAPP With SIEM Platform

Industry Spotlight

QNAP’s Buggy Security Fix Causes Chaos
Application Security Cybersecurity Data Privacy Data Security DevOps Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight IoT & ICS Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

QNAP’s Buggy Security Fix Causes Chaos

November 26, 2024 Richi Jennings | Nov 26 0
U.S. Agencies Seize Four North Korean IT Worker Scam Websites
Cloud Security Cybersecurity Data Security DevOps Endpoint Featured Identity & Access Industry Spotlight Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence 

U.S. Agencies Seize Four North Korean IT Worker Scam Websites

November 22, 2024 Jeffrey Burt | Nov 22 0
Here’s Yet Another D-Link RCE That Won’t be Fixed
Application Security Cyberlaw Cybersecurity Data Privacy Data Security Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight IoT & ICS Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

Here’s Yet Another D-Link RCE That Won’t be Fixed

November 21, 2024 Richi Jennings | Nov 21 0

Top Stories

Interpol, African Nations Arrest 1,006 in Sweeping ‘Operation Serengeti’
Cloud Security Cybersecurity Data Security Featured Identity & Access Incident Response Malware Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Interpol, African Nations Arrest 1,006 in Sweeping ‘Operation Serengeti’

November 27, 2024 Jeffrey Burt | 4 days ago 0
Exabeam Allies With Wiz to Integrate CNAPP With SIEM Platform
Application Security Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X 

Exabeam Allies With Wiz to Integrate CNAPP With SIEM Platform

November 27, 2024 Michael Vizard | 4 days ago 0
Supply Chain Ransomware Attack Hits Starbucks, UK Grocers
Cloud Security Cybersecurity Data Security Featured Identity & Access Incident Response Malware Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches 

Supply Chain Ransomware Attack Hits Starbucks, UK Grocers

November 26, 2024 Jeffrey Burt | Nov 26 0

Security Humor

Randall Munroe’s XKCD ‘D Combinatorics’

Randall Munroe’s XKCD ‘D Combinatorics’

Download Free eBook

7 Must-Read eBooks for Security Professionals

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2024 Techstrong Group Inc. All rights reserved.
×