Threats to vulnerable machine identities on the rise

Threats to vulnerable machine identities on the rise

The threat to cyber security posed by attacks on machine identities using off-the-shelf malware is rising fast.

According to threat analysis from Venafi, the leading provider of machine identity management, commodity malware campaigns that target machine identities are increasing rapidly. Malware attacks using machine identities doubled from 2018 to 2019, including high-profile campaigns such as: TrickBot, Skidmap, Kerberods and CryptoSink.

The Venafi Threat Intelligence Team has gathered data on the misuse of machine identities by analyzing security incidents and third-party reports in the public domain. Overall, malware attacks utilizing machine identities grew eight-fold over the last 10 years and increased more rapidly in the second half of the decade.

These findings are part of an ongoing threat research program focused on mapping the security risks connected with unprotected machine identities.

“Unfortunately, machine identities are increasingly being used in off-the-shelf malware,” said Yana Blachman, threat intelligence researcher at Venafi. “In the past, machine identity capabilities were reserved for high-profile and nation-state actors, but today we’re seeing a ‘trickle-down’ effect.”

According to Yana Blachman, machine identity capabilities have become commoditized and are being added to off-the-shelf malware, making it more sophisticated and harder to detect. For example, massive botnet campaigns abuse machine identities to get an initial foothold into a network and then move laterally to infect further targets.

In many recorded cases, bots download crypto-mining malware that hijacks a target’s resources and shuts down services. When successful, these seemingly simple and non-advanced attacks can inflict serious damage on an organization and its reputation.

This problem is made much more complicated by the explosion of micro-services, DevOps projects, cloud workloads and IoT devices on enterprise networks.

Today, there are already more than 31 billion IoT devices worldwide and the number of connected mobile devices is expected to grow to 12.3 billion by 2022. Between 2018 and 2023, 500 million new logical apps will be created, which is equal to the number built over the past 40 years.

All of these applications and devices must have machine identities to authenticate themselves to each other so they can communicate securely. However, machines—whether they are an app in a Kubernetes cluster or a serverless function in the cloud—don’t rely on usernames or passwords to establish trust, privacy and security. Instead, they use cryptographic keys and digital certificates that serve as machine identities.

Because most organizations do not have machine identity management programs in place, attacks exploiting machine identities are already causing serious economic damage.

Kevin Bocek, vice president of security strategy and threat intelligence at Venafi warns: “As we continue to move through digital transformation of nearly every essential service, it’s clear that human-centric security models are no longer effective. To protect our global economy, we need to provide machine identity management at machine speed and cloud scale. Every organization needs to ensure they have full visibility and comprehensive intelligence over every authorized machine they are using in order to defend themselves against the rising tide of attacks.”

The potential damage that could be caused by attacks on IT and OT systems that include vulnerable machine identities, including those in factories and utilities, is very substantial. While this threat is by no means unknown, it does appear that it is rising rapidly. The explosion of IoT devices can only make things worse.

The lesson is simple. Machine identities are just as vulnerable to compromise as human identities. It is no longer appropriate to trust them. They need to be protected proactively.

About Venafi

Venafi provides machine identity protection services that secure machine-to-machine connections and communications by orchestrating cryptographic keys and digital certificates for SSL/TLS, IoT, code signing, mobile and SSH. For more information, visit:

Copyright Lyonsdown Limited 2021

Top Articles

Australian energy giant CS Energy suffers a ransomware attack

Australian energy company CS Energy suffered a ransomware attack on November 27 that targeted its corporate network.

Misconfiguration of a management user interface (UI) tool leads to exposure of mission-critical data

Kafdrop, a popular open-source Apache Kafka user and management interface had configuration flaws that provided criminals with access to event-streaming platform Apache Kafka used by more than 60 per cent…

ICO serves £500,000 fine to the Cabinet Office for New Year Honours data breach

The ICO has fined the Cabinet Office £500,000 for failing to prevent the leak of postal addresses of over 1,000 people who were among the 2020 New Year Honours recipients.

Related Articles

[s2Member-Login login_redirect=”” /]