Between Equifax, Yahoo! and other major breaches, criminals have so much information on us, login credentials are almost meaningless. There is likely to be an increase in stolen credential threats with criminals masquerading as legitimate employees, accessing companies' most valued data assets. So how can companies detect and stop these bad actors before it's too late?
It starts with flipping the model–instead of focusing on preventing bad actors from stealing credentials, they should be asking, “What should we do once they are inside pretending to be one of our own employees?” It starts with taking a page out of the credit card industry's playbook. Ryan Stolte, co-founder and CTO at Bay Dynamics, sat down with Inside Counsel to discuss what the credit card industry is doing right and how it can be applied to cyber to minimize risk to companies when credentials are stolen.
Every time there's a significant breach, the criminals collect more information about us. With Yahoo!, for example, they collected usernames and passwords. With Equifax, they collected names, email addresses, social security numbers, birth dates and other personally identifiable information. By this point the criminals have enough of our information to build user profiles, leveraging the information to break into companies using legitimate user login credentials.
“The most significant breaches impacted millions, and in some cases billions of user accounts worldwide, with many of them involving criminals stealing login credentials,” explained Stolte. “Not to mention, oftentimes stolen credentials end up on the dark web, available for other bad actors to buy and leverage. Once they have user credentials, the criminals log in into legitimate users' accounts, pretending to be them. In some cases, they stick around for months, accessing sensitive corporate data without raising any flags because they used legitimate credentials.”
So, how can companies detect and stop these bad actors before it's too late? According to Stolte, companies need to flip the model. Instead of asking, “How can we keep the bad guys out,” they should be asking, “How can we detect them once they are in?” They should use user and entity behavior analytics (UEBA) to monitor and detect when a user's behavior seems out of the ordinary, and integrate UEBA with data loss prevention technology to prioritize which users to investigate before sensitive data is stolen.
“For example, let's say a criminal steals John's login credentials and accesses a highly sensitive database post [during] John's typical work hours from a country John does not live in. Data loss prevention technology would follow the data, blocking the criminal from exfiltrating it,” he explained. “UEBA technology would detect John's unusual behavior, confirm it's unusual for John's peers and overall team, and prioritize the alert based on impact to the business if [the] database under attack were compromised, the value of the database and associated vulnerabilities. Within minutes, analysts would receive the threat alert and could investigate the perpetrator before the damage is done.”
Today, multifactor authentication integrated with UEBA is another useful tool because, in John's case, UEBA would detect the unusual behavior and multifactor would send a text to the real John asking him to confirm if he logged into the database. If John doesn't respond or says “no,” then the criminal would not be allowed access to the database. With UEBA and technologies like data-loss prevention, multifactor authentication, encryption, tagging and others, whether John is doing a bad thing, someone hijacked his account and is doing a bad thing, or a machine is pretending to be him, the technologies will detect the behavior and enable responders to act quickly, before sensitive data walks out the door.
“Companies need to assume the criminals are already inside,” said Stolte. “They should assume criminals have already stolen employees' login credentials due to significant breaches of the past, and focus on detecting and mitigating bad actors pretending to be legitimate employees. No one can 100 percent walk in someone else's shoes so at some point the criminals will behave in a way that's unusual for the legitimate employee, and if companies are focused on an inside-out mode of operation, they will catch them.”
The credit card industry has mastered the model of detecting and mitigating fraud. For example, Stolte recently received a text message from his card company asking if he bought gas in Connecticut. He lives and works in New York City, so it would be unusual for him to buy gas in Connecticut. He responded “no,” and his credit card account was frozen. On the other hand, he also received a call from his card company asking if he bought gas in Iowa. At that time, he happened to be in Iowa visiting family, so he responded “yes,” and his day continued, business as usual.
In cyber, the same lessons should apply, per Stolte. If an employee was detected doing something he normally would not do, he should receive a text message or another form of confirmation, asking him to confirm it's really him. If he responds, “no,” then his account should be frozen so the criminal cannot move any further. If he responds “yes,” or if his manager confirms that he was given permission for business purposes, then the employee should be able to go about his business uninterrupted.
He said, “The process enables companies to detect a criminal masquerading as a legitimate employee and stopping him from stealing sensitive data, while enabling real employees to do their jobs uninterrupted.”
Amanda G. Ciccatelli is a Freelance Journalist for Corporate Counsel and InsideCounsel, where she covers intellectual property, legal technology, patent litigation, cybersecurity, innovation, and more.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllLegal Departments’ Lack of Third-Party Oversight Leaving Small, Midsized Banks Exposed
4 minute readTen Best Practices to Protect Your Organization Against Cyber Threats
7 minute readSEC Fines 4 Companies $7M for Downplaying Breaches Tied to Massive SolarWinds Hack
Trending Stories
- 1Gibson Dunn Sued By Crypto Client After Lateral Hire Causes Conflict of Interest
- 2Trump's Solicitor General Expected to 'Flip' Prelogar's Positions at Supreme Court
- 3Pharmacy Lawyers See Promise in NY Regulator's Curbs on PBM Industry
- 4Outgoing USPTO Director Kathi Vidal: ‘We All Want the Country to Be in a Better Place’
- 5Supreme Court Will Review Constitutionality Of FCC's Universal Service Fund
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250