CYBR CyberArk Software Ltd.

CyberArk Labs: Exploiting Domain-Level Service Credentials

CyberArk (NASDAQ: CYBR) today unveiled new research from CyberArk Labs detailing what it considers to be a significant risk across all Windows endpoints, including those on Windows 10 with Credential Guard enabled. The exploit could allow cyber attackers to harvest encrypted service credentials from the registry and inject them into a new malicious service to achieve lateral movement and full domain compromise.

Microsoft Credential Guard was introduced to mitigate the risk of lateral movement using compromised credentials, yet Credential Guard does not protect domain-level user and service credentials equally. Despite being encrypted, domain-level service credentials remain in the registry, at risk of compromise by attackers who have obtained local administrator privileges on an infected endpoint.

Similar in concept to Pass-the-Hash attacks, if fully exploited, cyber attackers could compromise and reuse an encrypted service credential – without ever needing to decrypt it – to move laterally through the organization and ultimately be able to gain access to a domain controller.

From Stolen Credential to Domain Compromise

In a proof of concept, CyberArk Labs researchers were able to demonstrate that attackers with local administrator access on a single user’s machine could compromise domain-level service credentials and reuse them in encrypted form to achieve lateral movement and full domain compromise, even when Credential Guard is enabled. CyberArk’s testing showed that an attacker with local administrator access would not have to use malware to execute this type of attack, and by exploiting this risk, an attacker could gain full ownership of the entire domain in just minutes.

“This research is important to help organizations understand that not all credentials are protected equally, and further, encrypted credentials are not necessarily secure,” said Kobi Ben Naim, senior director of cyber research, CyberArk Labs. “By better understanding the risks associated with credential theft, organizations can prioritize mitigation strategies, starting on the endpoint.”

To learn more, including the specific attack methodology and mitigation strategies for domain-level service credential exploits, read the full CyberArk Labs report, “Stealing Service Credentials to Achieve Full Domain Compromise.”

Research from CyberArk Labs focuses on targeted attacks against organizational networks – the methods, tools and techniques employed by cyber attackers, as well as methods and techniques to detect and mitigate such attacks.

About CyberArk

CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including 45 percent of the Fortune 100 – to protect their highest value information assets, infrastructure and applications. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout EMEA and Asia Pacific and Japan. To learn more about CyberArk, visit www.cyberark.com, read the company blog, http://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at https://www.facebook.com/CyberArk.

Copyright © 2016 CyberArk Software. All Rights Reserved. Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other brand names, product names, or trademarks belong to their respective holders.

EN
16/11/2016

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on CyberArk Software Ltd.

Cyberark Software Ltd: 4 directors

A director at Cyberark Software Ltd sold after exercising options/sold 5,162 shares at 462.023USD and the significance rating of the trade was 75/100. Is that information sufficient for you to make an investment decision? This report gives details of those trades and adds context and analysis to them such that you can judge whether these trading decisions are ones worth following. Included in the report is a detailed share price chart which plots discretionary trades by all the company's direc...

Anish Jog ... (+6)
  • Anish Jog
  • Daniel Ives
  • Matthew Weiss
  • Sam Brandeis
  • Scott Devitt
  • Steven Wahrhaftig

Cybersecurity Channel Partner Feedback for September Quarter

CRWD: Continuing to Win, Separating from CompetitionCRWD came in 5-9% above plan as the company continues to gain momentum across Falcon Flex with improving sales options with its partner ecosystem, including OKTA and ZS, to drive stronger pipeline activity without any kind of channel stuffing. The

ResearchPool Subscriptions

Get the most out of your insights

Get in touch