According to Centrify, the hacked defence subcontractor had all IT-related functions managed by just one person, who had been in the role for only nine months and, while initial access came from exploiting a 12-month-old vulnerability in the company’s IT Helpdesk Portal, the hacker used a common Local Administrator account password with access to all servers for lateral movement within the network.
“This provided access to email and other sensitive data,” Centrify senior director APAC Sales Niall King said.
Centrify was commenting on the report that the unnamed defence contractor was using default usernames and passwords like "admin" and "guest" when its systems were breached and data stolen last year.
Noting that the practice of allowing privileged administrator accounts to have extensive network access was ”disturbingly widespread", King said Verizon recently reported that 80% of breaches are due to “compromised credentials”.
“The lesson is that users and administrators should never run their computer with administrative privileges unless they are required to do a specific task. This is where the ‘Least Privilege’ model advocated and implemented by Centrify is important: It assigns users and administrators with privileges on a temporary basis to perform specific tasks on specific machines.
“Least Privilege Access ensures that if an exploit or attack occurs, it will not have the privileged access necessary to cause sustained damage. Security can be improved further by mandating multi-factor authentication (MFA) approval by the user before a privileged task executes,” King said.