CISA Issues Warning on Credential Access in FY23 Risk and Vulnerability Assessment

Published:

Understanding the Growing Threat of Credential Access: Insights from CISA and IBM Reports

In an era where cyber threats are becoming increasingly sophisticated, the importance of understanding the tactics employed by threat actors cannot be overstated. The Cybersecurity and Infrastructure Security Agency (CISA) recently released its Fiscal Year 2023 (FY23) Risk and Vulnerability Assessments (RVA) Analysis, which provides a critical examination of the methods used to compromise critical infrastructure. Complementing this, IBM’s X-Force Threat Intelligence Index 2024 has identified credential access as one of the most significant risks facing organizations today. Together, these reports highlight the persistent and evolving threat of credential access, emphasizing the need for robust cybersecurity measures.

CISA’s FY23 RVA: Credential Access in the Spotlight

CISA’s FY23 RVA report reveals that credential access remains a prevalent and effective tactic used by threat actors to infiltrate networks. The analysis was based on 143 RVAs conducted across various critical infrastructure sectors, including federal agencies, state and local governments, and private organizations. By mapping findings to the MITRE ATT&CK® framework, the report illustrates the tactics that attackers favor most.

Among the tactics identified, credential dumping (T1003) and LLMNR/NBT-NS poisoning (T1557.001) were highlighted as common techniques. Credential dumping, which involves stealing password hashes or cleartext passwords from system memory, was successful in 14% of the assessments. This technique allows attackers to move laterally within networks undetected. Similarly, LLMNR/NBT-NS poisoning, which exploits weaknesses in name resolution protocols, was successful in 13% of cases. These techniques enable attackers to exploit systems without triggering alarms, allowing them to escalate privileges and access sensitive data.

Once attackers obtain legitimate credentials, they can create new accounts to maintain access, even if part of their operation is detected and neutralized. This ability to blend in with legitimate users makes it increasingly difficult for security teams to identify malicious activities in real time.

Credential Access: A Top Threat

IBM’s X-Force Threat Intelligence Index 2024 echoes CISA’s findings, identifying credential access as the most significant risk to organizations globally. Attackers are increasingly focusing on stealing or cracking credentials as the easiest way to bypass security measures and gain access to critical systems. Techniques such as keylogging, phishing, and sophisticated malware are employed to exploit the weakest link in cybersecurity—human behavior.

Credential theft is not merely a tactic; it serves as a gateway to executing more complex and damaging cyberattacks, including ransomware, espionage, and data exfiltration. The IBM X-Force report emphasizes that credential access allows attackers to operate under the radar, making it challenging for security teams to detect their activities. The combination of poor password hygiene, lack of multi-factor authentication (MFA), and human error remains a significant vulnerability for many organizations.

The Volt Typhoon Campaign: A Case Study in Credential Access

CISA’s report references real-world campaigns, such as the Volt Typhoon campaign, which targeted Fortinet Fortiguard devices from 2021 to 2023. This state-sponsored campaign utilized credential dumping to steal operating system and domain credentials. Attackers employed tools like Mimikatz and Impacket to exploit weaknesses in the LSASS process, extracting password hashes and enabling lateral movement within targeted networks.

The Volt Typhoon campaign serves as a stark reminder of the potential consequences of credential access. By gaining deeper access to networks and systems, attackers can execute a range of malicious activities, from data theft to system disruption.

Mitigating the Threat: What Organizations Can Do

Both CISA and IBM stress the need for proactive cybersecurity measures to mitigate the risks associated with credential access. Here are some key recommendations:

  1. Implement Multi-Factor Authentication (MFA): Utilizing MFA significantly reduces the risk of compromised credentials being exploited by attackers. By requiring additional verification methods, organizations can add an extra layer of security.

  2. Secure Privileged Accounts: Organizations should ensure that privileged accounts have stronger security measures, such as unique passwords and limited access. Regularly reviewing and updating access controls can help minimize risks.

  3. Regular Auditing and Monitoring: Continuous monitoring for unusual login activity, especially across privileged accounts, can help detect suspicious activities early. Implementing automated alerts for anomalous behavior can enhance response times.

  4. Educate Employees: Training employees on recognizing phishing attempts and practicing good password hygiene is crucial. Regular awareness programs can help mitigate the risk posed by human error.

Conclusion

As highlighted by both CISA and IBM, credential access continues to be a critical cyber threat that organizations must address. The insights from these reports underscore the need for immediate action to strengthen defenses against credential attacks. By implementing robust security measures and fostering a culture of cybersecurity awareness, organizations can better protect themselves against the evolving landscape of cyber threats. The time to act is now—before credential access leads to devastating consequences.

Related articles

Recent articles