You’ve no doubt heard the phrase, “Attackers don’t hack anyone these days. They log on.” By obtaining (or stealing) valid user account details, an attacker can gain access to a system, remain hidden, and then elevate their privileges to “log in” to more areas of the network.
As a result of the level of access stolen credentials can provide, the use of valid accounts is prevalent across the threat landscape. Not only is it the second most common MITRE ATT&CK tactic, but the rise of MFA and an increase in basic phishing awareness means adversaries have gotten more creative. Often, this ends with the user being targeted for possible manipulation as part of an “insider attack.”
But don't worry, at Duo, we've got you. To illustrate ways in which security practitioners can help defend against the techniques employed in credential stealing attacks, this webinar will break down an identity attack piece by piece. There will also be a discussion of methods and mechanisms to prevent or detect these techniques to stop breaches or limit their impact.