Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

RCE Critical Disadvantages in Cisco ISE and ISE-PIC allow unauthorized attackers to access the roots

June 26, 2025

Why is built -in protection insufficient for modern data sustainability

June 26, 2025

Iranian APT35 hackers are oriented

June 26, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Anywhere there is ransomware, a hacked service account. Are you protected?
Global Security

Anywhere there is ransomware, a hacked service account. Are you protected?

AdminBy AdminSeptember 19, 2024No Comments6 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Just a couple of years ago, only a few IAM professionals knew what service accounts were. In recent years, these silent accounts of non-human entities (NHIs) have become one of the most targeted and compromised attack surfaces. It is estimated that compromised service accounts play a key role in lateral movement in more than 70% of ransomware attacks. However, there is a troubling disparity between the exposure and potential impact of hacking work accounts, and the security measures available to mitigate this risk.

In this article, we explore what makes service accounts such a lucrative target, why they fall outside security controls, and how a new unified identity security approach can prevent service accounts from hacking and abuse.

Active Directory Accounts 101: Non-Human Identities Used for M2M

In an Active Directory (AD) environment.service accounts are user accounts that are not associated with people but are used for machine-to-machine communication. They are created by administrators either to automate repetitive tasks or during the installation of local software. For example, if you have EDR in your environment, there is a service account that is responsible for receiving updates for the EDR agent on your endpoint and servers. Apart from the NHI account, service accounts are no different from other user accounts in AD.

Why do attackers target service accounts?

Ransomware actors rely on compromised AD accounts – preferably privileged ones – for lateral movement. The ransomware actor will make these lateral moves until it gains a foothold strong enough to encrypt multiple machines with a single click. They typically achieve this by accessing a domain controller or other server used to distribute the software and abusing shared network access to run the ransomware on as many machines as possible.

While any user account will work for this purpose, service accounts are best for the following reasons:

High access privileges

Most service accounts are created to access other machines. This inevitably means that they have the necessary access rights to log in and execute code on those machines. This is exactly what threat actors are looking for, as compromising these accounts will allow them to gain access and execute their malicious payloads.

Low visibility

Some work accounts, especially those associated with installed on-premises software, are known to IT and IAM staff. However, many are custom-built by IT and identity professionals without documentation. This makes the task of maintaining a a controlled inventory of service accounts is virtually impossible. This favors attackers, as the compromise and abuse of an uncontrolled account is much more likely to go unnoticed by the victim of an attack.

Lack of security controls

Common security measures used to prevent account compromise are MFA and PAM. MFA cannot be applied to service accounts because they are not human and do not have a phone, hardware token, or any other additional factor that can be used to verify their identity beyond username and passwords. PAM solutions also struggle with protecting service accounts. Password rotation, which is the primary security control used in PAM solutions, cannot be applied to service accounts because of concerns about their authentication and the disruption of critical processes they control. This leaves service accounts virtually unprotected.

Want to learn more about protecting your service accounts? Explore our eBook, Overcoming work account security blind spotsto learn more about service account protection issues and receive recommendations for dealing with these issues.

Reality Bytes: Every company is a potential victim regardless of vertical or size

It was once said that ransomware is a great democratizer that doesn’t discriminate between victims on any grounds. This is more true than ever with service accounts. In past years, we investigated the incidents in companies from 200 to 200 thousand employees in the field of finance, production, retail trade, telecommunications and many others. In 8 out of 10 cases, their attempted lateral movement resulted in the hacking of service accounts.

As always, attackers teach us best where our weakest links are.

Silverfort Solution: Unified Identity Security Platform

A new category of security – identity security – provides an opportunity to change the situation on free management, which adversaries used until now in service accounts. Silverfort’s identity security platform is built on proprietary technology that enables it to have continuous visibility, risk analysis and proactive enforcement of any AD authentication, including of course that made by service accounts.

Let’s see how this is used to prevent attackers from using them for malicious access.

Silverfort Service Account Protection: Automated Detection, Profiling and Protection

Silverfort enables identity and security teams keep your service accounts secure as follows:

Automated detection

Silverfort sees and analyzes every AD authentication. This allows the AI ​​engine to easily identify accounts that exhibit deterministic and predictable behaviors that characterize service accounts. After a short training period, Silverfort provides its users with a complete listing of their service accounts, including privilege levels, sources and destinations, and other data that reflects the behavior of each one.

Behavioral analysis

For each identified service account, Silverfort defines a behavioral baseline that includes the sources and destinations it typically uses. The Silverfort engine continuously learns and enriches this base layer to capture account behavior as accurately as possible.

Virtual fencing

Based on the behavioral baseline, Silverfort automatically creates a policy for each service account that triggers a protective action whenever the account deviates from standard behavior. This action can be just a warning or even a complete block of access. Therefore, even if the credentials of the service account are compromised, an attacker will not be able to use them to access any resources other than those included in the baseline. All that is required of the Silverfort user is to enable the policy without any additional effort.

Conclusion: It’s time to act. Make sure your service accounts are secure

You better get hold of your service accounts before your attackers do. This is the true vanguard of the modern threat. Do you have a way to see, monitor and protect your service accounts from being hacked? If the answer is no, it’s only a matter of time before you join the ranks of the ransomware statistics.

Want to learn more about protecting your Silverfort service account? Visit our site or contact one of our experts for a demo.

Did you find this article interesting? This article is from one of our respected partners. Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

RCE Critical Disadvantages in Cisco ISE and ISE-PIC allow unauthorized attackers to access the roots

June 26, 2025

Why is built -in protection insufficient for modern data sustainability

June 26, 2025

Iranian APT35 hackers are oriented

June 26, 2025

Cyber-Cyber ​​Use open source tools to compromise financial institutions across Africa

June 26, 2025

CISA adds 3 flaws to KEV directory, affecting AMI Megarac, D-Link, Fortinet

June 26, 2025

WhatsApp adds resumes that run on AI, for faster preview chat

June 26, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

RCE Critical Disadvantages in Cisco ISE and ISE-PIC allow unauthorized attackers to access the roots

June 26, 2025

Why is built -in protection insufficient for modern data sustainability

June 26, 2025

Iranian APT35 hackers are oriented

June 26, 2025

Cyber-Cyber ​​Use open source tools to compromise financial institutions across Africa

June 26, 2025

CISA adds 3 flaws to KEV directory, affecting AMI Megarac, D-Link, Fortinet

June 26, 2025

WhatsApp adds resumes that run on AI, for faster preview chat

June 26, 2025

Noauth vulnerability by -still affects 9% Microsoft Entra Saas applications two years after opening

June 25, 2025

Citrix releases emergency patches for actively exploited CVE-2025-6543 in ADC NetsCale

June 25, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

RCE Critical Disadvantages in Cisco ISE and ISE-PIC allow unauthorized attackers to access the roots

June 26, 2025

Why is built -in protection insufficient for modern data sustainability

June 26, 2025

Iranian APT35 hackers are oriented

June 26, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.