Stolen credentials on the Dark Web

1 October 2019 Information Security, Security Services & Risk Management

Web security company, ImmuniWeb, has conducted research into the state of stolen credentials available on the Dark Web, which are being exploited by cybercriminals for spear-phishing and password re-use attacks against the highest-grossing global public and private companies - the Fortune 500.

ImmuniWeb used its all-in-one ImmuniWeb Discovery application discovery and inventory service solution to crawl generally accessible places and resources within the TOR network, across various Web forums, Pastebin, IRC channels, social networks, messenger chats and many other locations notorious for offering, selling or distributing stolen or leaked data.

Key findings: passwords

Over 21 million (21 040 296) credentials belonging to Fortune 500 companies, among which over 16 million (16 055 871) were compromised during the last 12 months.

As many as 95% of the credentials contained unencrypted, or brute-forced and cracked by the attackers, plaintext passwords.

Perhaps unsurprisingly, technology was the industry with the largest volume of credentials exposed in breaches of adult-oriented websites and resources, followed by financials and energy.

There were only 4,9 million (4 957 093) fully unique passwords amid the 21 million records, suggesting that many users are using identical or similar passwords.

One of the most common passwords in most of the industries researched was password.

Retail was the industry with the highest number of weak or default passwords.

Approximately 42% of the stolen passwords are somehow related either to the victim’s company name or to the breached resource in question, making password brute-forcing attacks highly efficient.

On average, 11% of the stolen passwords from one breach are identical - pointing to usage of default passwords, proliferation of spam and data scraping bots creating accounts, or a previous password reset setting an identical password to a large set of accounts.

Key findings: domains

The number of squatted domains and phishing websites per organisation is proportional to the total number of exposed credentials. The more illegitimate resources exist, the more credentials can be found for the organisation’s personnel.

The number of subdomains with failing Web security grade (C or F) is proportional to the number of exposed credentials. The more poorly secured a website is, the more credentials can be found for the organisation’s personnel.

Key findings: data

Over half of publicly accessible data is outdated or fake, or just comes from historical breaches in a false pretence to be newly compromised records.

The most popular sources of the exposed breaches were:

1.Third parties (e.g. websites or other resources of unrelated organisations).

2.Trusted third parties (e.g. websites or other resources of partners, suppliers or vendors).

3.The companies themselves (e.g. their own websites or other in-house resources).

Ilia Kolochenko, CEO and founder of ImmuniWeb, commented: “These numbers are both frustrating and alarming. Cybercriminals are smart and pragmatic, they focus on the shortest, cheapest and safest way to get your crown jewels. The great wealth of stolen credentials accessible on the Dark Web is a modern-day Klondike for mushrooming threat actors who don’t even need to invest in expensive zero-day or time-consuming APTs (the Klondike Gold Rush was a migration by an estimated 100 000 prospectors to the Klondike region of the Yukon, in north-western Canada, between 1896 and 1899). With some persistence, they easily break in, being unnoticed by security systems and grab what they want. Worse, many such intrusions can technically not be investigated due to lack of logs or control over the breached [third-party] systems.

In the era of cloud, containers and continuous outsourcing of critical business processes, most organisations have lost visibility and thus control over their digital assets and data. You cannot protect what you don’t see, likewise you cannot safeguard the data if you don’t know where it’s being stored and who can access it. Third-party risks immensely exacerbate the situation by adding even more perilous unknowns into the game.

A well-thought, coherent and holistic cybersecurity and risk management programme should encompass not just your organisation but third parties in a continuous and data-driven manner.

Full research and infographics at: target="_blank">www.immuniweb.com/blog/stolen-credentials-dark-web-fortune-500.html




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...