www.proofpoint.com Open in urlscan Pro
2a02:e980:107::cf  Public Scan

URL: https://www.proofpoint.com/us/blog/identity-threat-defense/types-identity-threats-attacks
Submission: On May 31 via api from IN — Scanned from DE

Form analysis 4 forms found in the DOM

<form class="header-nav__search-form">
  <input type="text" class="header-nav__search-input" placeholder="">
  <input type="submit" class="header-nav__search-button" val="Search">
</form>

<form id="mktoForm_19277" data-mkto-id="19277" data-mkto-base="//app-abj.marketo.com" data-munchkin-id="309-RHV-619" data-submit-text="" data-redirect-link="" data-prefill="" data-event-label="" data-lang-code="us" data-validate-email="1"
  class="mk-form__form marketo-form-block__form mktoForm mktoHasWidth mktoLayoutLeft js-visible mkto-form-processed" data-asset-type="Blogs Subscribe" novalidate="novalidate"
  style="font-family: inherit; font-size: 16px; color: rgb(51, 51, 51); width: 1601px;">
  <style type="text/css"></style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
      <div class="mktoOffset" style="width: 5px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 150px;">
          <div class="mktoAsterix">*</div>Business Email:
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><input id="Email" name="Email" placeholder="Business Email  *" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email"
          class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 200px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="blogInterest" class="mktoField mktoFieldDescriptor mktoFormCol" value="All Blog Posts" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Employees_Picklist__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="State" class="mktoField mktoFieldDescriptor mktoFormCol" value="State/Province" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Most_Recent_Medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="Website" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Most_Recent_Medium_Detail__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="www-pfpt" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Industry" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Website" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="AnnualRevenue" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="demandbasesid" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="demandBase_Data_Source" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Primary_Product_Interest__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="UTM_Post_ID__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="utmcampaign" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="utmterm" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="db_employee_count" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Unsubscribed" class="mktoField mktoFieldDescriptor mktoFormCol" value="0" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoNative" style="margin-left: 110px;"><button type="submit" class="mktoButton">Submit</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
    value="19277" placeholder=""><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="309-RHV-619" placeholder=""><input type="hidden" name="Website_Conversion_URL__c" class="mktoField mktoFieldDescriptor"
    value="https://www.proofpoint.com/us/blog/identity-threat-defense/types-identity-threats-attacks" placeholder=""><input type="hidden" name="gAClientID" class="mktoField mktoFieldDescriptor" value="772219845.1717144117" placeholder="">
  <style type="text/css"></style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
      <div class="mktoOffset" style="width: 5px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 150px;">
          <div class="mktoAsterix">*</div>Business Email:
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><input id="Email" name="Email" placeholder="Business Email *" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email"
          class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 200px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="blogInterest" class="mktoField mktoFieldDescriptor mktoFormCol" value="All Blog Posts" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Employees_Picklist__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="State" class="mktoField mktoFieldDescriptor mktoFormCol" value="State/Province" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Most_Recent_Medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="Website" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Most_Recent_Medium_Detail__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="www-pfpt" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Industry" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Website" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="AnnualRevenue" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="demandbasesid" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="demandBase_Data_Source" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Primary_Product_Interest__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="UTM_Post_ID__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="utmcampaign" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="utmterm" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="db_employee_count" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Unsubscribed" class="mktoField mktoFieldDescriptor mktoFormCol" value="0" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoNative" style="margin-left: 110px;"><button type="submit" class="mktoButton">Submit</button></span></div>
</form>

<form data-mkto-id="19277" data-mkto-base="//app-abj.marketo.com" data-munchkin-id="309-RHV-619" data-submit-text="" data-redirect-link="" data-prefill="" data-event-label="" data-lang-code="us" data-validate-email="1"
  class="mk-form__form marketo-form-block__form mktoForm mktoHasWidth mktoLayoutLeft" data-asset-type="Blogs Subscribe" novalidate="novalidate"
  style="font-family: inherit; font-size: 16px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>

<form data-mkto-id="19277" data-mkto-base="//app-abj.marketo.com" data-munchkin-id="309-RHV-619" data-submit-text="" data-redirect-link="" data-prefill="" data-event-label="" data-lang-code="us" data-validate-email="1"
  class="mk-form__form marketo-form-block__form mktoForm mktoHasWidth mktoLayoutLeft js-visible mkto-form-processed" data-asset-type="Blogs Subscribe" novalidate="novalidate"
  style="font-family: inherit; font-size: 16px; color: rgb(51, 51, 51); width: 1600px; visibility: hidden; position: absolute; top: -500px; left: -1000px;"></form>

Text Content

Skip to main content
English (Americas)
Search
Login
 * Products
 * Solutions
 * Resources

Proofpoint
Contact

Search

 * Products
 * Solutions
 * Partners
 * Resources
 * Company

Search
Login
English (Americas)
Products
Solutions
Partners
Resources
Company


MAXIMIZE SECURITY. OPTIMIZE VALUE.

Human-centric cybersecurity packages from Proofpoint.
See Packages

--------------------------------------------------------------------------------

Products
Protect People
Multi-layered, adaptive defenses for threat detection, impersonation, and
supplier risk.
Defend Data
Transform your information protection with a human-centric, omni-channel
approach.
Mitigate Human Risk
Unlock full user risk visibility and drive behavior change.
Premium Services
Leverage proactive expertise, operational continuity and deeper insights from
our skilled experts.


PROTECT PEOPLE

Multi-layered, adaptive defenses for threat detection, impersonation, and
supplier risk.
Learn More

Learn more about our products below:
Stop Human-Targeted Attacks
Prevent Impersonation


DEFEND DATA

Transform your information protection with a human-centric, omni-channel
approach.
Learn More

Learn more about our products below:
Prevent Misdirected Emails
Stop Data Loss
Contain Insider Threats
Intelligent Compliance


SOLUTIONS

See how we solve today's complex cyber threats and attacks.
Solutions by Industry
People-centric solutions for your organization.
Authenticate Your Email
Protect your email deliverability with DMARC.
Combat Email and Cloud Threats
Protect your people from email and cloud threats with an intelligent and
holistic approach.
Change User Behavior
Help your employees identify, resist and report attacks before the damage is
done.
Combat Data Loss and Insider Risk
Prevent data loss via negligent, compromised and malicious insiders.
Modernize Compliance and Archiving
Manage risk and data retention needs with a modern compliance and archiving
solution.
Protect Cloud Apps
Keep your people and their cloud apps secure by eliminating threats and data
loss.
Prevent Loss from Ransomware
Learn about this growing threat and stop attacks by securing ransomware's top
vector: email.
Secure Microsoft 365
Implement the best security and compliance solution for Microsoft 365.


SOLUTIONS BY INDUSTRY

People-centric solutions for your organization.
Federal Government
Cybersecurity for federal government agencies.
State and Local Government
Protecting the public sector, and the public from cyber threats.
Higher Education
A higher level of security for higher education.
Financial Services
Eliminate threats, build trust and foster growth for your organization.
Healthcare
Protect clinicians, patient data, and your intellectual property against
advanced threats.
Mobile Operators
Make your messaging environment a secure environment.
Internet Service Providers
Cloudmark email protection.
Small and Medium Businesses
Big-time security for small business.


PARTNERS

Deliver Proofpoint solutions to your customers.
Channel Partners

Archive Extraction Partners
Learn about Extraction Partners.
GSI and MSP Partners
Learn about our global consulting.
Technology and Alliance Partners
Learn about our relationships.
Social Media Protection Partners
Learn about the technology and....
Proofpoint Essentials Partner Programs
Small Business Solutions .
Become a Channel Partner


RESOURCES

Find reports, webinars, blogs, events, podcasts and more.
Resource Library

Blog
Keep up with the latest news and happenings.
Webinars
Browse our webinar library to learn about the latest threats, trends and issues
in cybersecurity.
Podcasts
Learn about the human side of cybersecurity.
New Perimeters Magazine
Get the latest cybersecurity insights in your hands.
Threat Glossary
Learn about the latest security threats.
Events
Connect with us at events to learn how to protect your people and data from
ever-evolving threats.
Customer Stories
Read how our customers solve their most pressing cybersecurity challenges.


COMPANY

Proofpoint protects organizations' greatest assets and biggest risks: their
people.
About Proofpoint

Why Proofpoint
Learn about our unique people-centric approach to protection.
Careers
Stand out and make a difference at one of the world's leading cybersecurity
companies.
News Center
Read the latest press releases, news stories and media highlights about
Proofpoint.
Privacy and Trust
Learn about how we handle data and make commitments to privacy and other
regulations.
Environmental, Social, and Governance
Learn how we apply our principles to positively impact our community.
Support
Access the full range of Proofpoint support services.
Search Proofpoint
Try searching for
Email Security Phishing DLP Email Fraud
Select Product Login
 * Support Log-in
 * Digital Risk Portal
 * Email Fraud Defense
 * ET Intelligence
 * Proofpoint Essentials
 * Sendmail Support Log-in

Select Language
 * English (Americas)
 * English (Europe, Middle East, Africa)
 * English (Asia-Pacific)
 * Español
 * Deutsch
 * Français
 * Italiano
 * Português
 * 日本語
 * 한국어

Blog
Identity Threat Defense
Types of Identity Threats and Attacks You Should Be Aware Of 


TYPES OF IDENTITY THREATS AND ATTACKS YOU SHOULD BE AWARE OF 

Share with your network!

January 22, 2024 Matthew Gardiner

It’s easy to understand why today’s cybercriminals are so focused on exploiting
identities as a key step in their attacks. Once they have access to a user’s
valid credentials, they don’t have to worry about finding creative ways to break
into an environment. They are already in.  

Exploiting identities requires legwork and persistence to be successful. But in
many ways this tactic is simpler than exploiting technical vulnerabilities. In
the long run, a focus on turning valid identities into action can save bad
actors a lot of time, energy and resources. Clearly, it’s become a favored
approach for many attackers. In the past year, 84% of companies experienced an
identity-related security breach. 

To defend against identity-based attacks, we must understand how bad actors
target the authentication and authorization mechanisms that companies use to
manage and control access to their resources. In this blog post, we will
describe several forms of identity-based attacks and methods and offer an
overview of some security controls that can help keep identity theft attacks at
bay. 


TYPES OF IDENTITY-BASED ATTACKS AND METHODS 

Below are eight examples of identity attacks and related strategies. This is not
an exhaustive list and, of course, cybercriminals are always evolving their
techniques. But this list does provide a solid overview of the most common types
of identity threats.  

1. CREDENTIAL STUFFING 

Credential stuffing is a type of brute-force attack. Attackers add pairs of
compromised usernames and passwords to botnets that automate the process of
trying to use the credentials on many different websites at the same time. The
goal is to identify account combinations that work and can be reused across
multiple sites.  

Credential stuffing is a common identity attack technique, in particular for
widely used web applications. When bad actors find a winning pair, they can
steal from and disrupt many places at once. Unfortunately, this strategy is
highly effective because users often use the same passwords across multiple
websites. 

2. PASSWORD SPRAYING 

Another brute-force identity attack method is password spraying. A bad actor
will use this approach to attempt to gain unauthorized access to user accounts
by systematically trying commonly used passwords against many usernames.  

Password spraying isn’t a traditional brute-force attack where an attacker
attempts to use many passwords against a single account. It is a more subtle and
stealthy approach that aims to avoid account lockouts. Here’s how this identity
attack usually unfolds: 

 * The attacker gathers a list of usernames through public information sources,
   leaked databases, reconnaissance activities, the dark web and other means. 
 * They then select a small set of commonly used or easily guessable passwords.
 * Next, the attacker tries each of the selected passwords against a large
   number of user accounts until they find success. 

Password spraying is designed to fly under the radar of traditional security
detection systems. These systems may not flag these identity-based attacks due
to the low number of failed login attempts per user. Services that do not
implement account lockout policies or have weak password policies are at risk
for password spraying attacks.  

3. PHISHING 

Here’s a classic and very effective tactic that’s been around since the
mid-1990s. Attackers use social engineering and phishing to target users through
email, text messages, phone calls and other forms of communication. The aim of a
phishing attack is to trick users into falling for the attacker’s desired
action. That can include providing system login credentials, revealing financial
data, installing malware or sharing other sensitive data.

Phishing attack methods have become more sophisticated over the years, but they
still rely on social engineering to be effective.  

4. SOCIAL ENGINEERING  

Social engineering is more of an ingredient in an identity attack. It’s all
about the deception and manipulation of users, and it’s a feature in many types
of cyberattacks, not just email phishing. 

It is generally accepted that humans are the weakest link in cybersecurity. And
social engineering is a strategy meant to take advantage of a targeted user’s
inability to understand or resist an attack. In a social engineering-based
threat, an attacker will use human emotion—like fear, urgency or greed—to trick
the target into performing an action, such as disclosing their credentials or
sending money. 

5. ADVERSARY-IN-THE-MIDDLE (AITM) 

AiTM (formerly man-in-the-middle) is a type of digital eavesdropping and theft
where an attacker intercepts data from a sender to the recipient, and then from
the recipient back to the sender. The attacker’s device sits somewhere between
the sender and recipient. It relays messages silently, unbeknownst to either
party. While both sides of the communication believe they are dealing with a
legitimate party, the fact is that the cybercriminal is operating in the
middle. 

Through this technique, attackers can take over the entire authenticated
session, obtain passwords, bypass MFA, steal intellectual property, private
messages and more. And in advanced AiTM attacks, attackers might go so far as to
install malware on a user’s device without their knowledge or involvement. 

6. KERBEROASTING 

While its name evokes some type of cozy fireside activity, Kerberoasting is far
from fun for those who are targeted. Kerberoasting takes advantage of
Microsoft’s Kerberos authentication, a process through which users and services
authenticate themselves on a network. Bad actors attempt to crack (or
kerberoast) the passwords of service accounts within Microsoft Active Directory
(AD) environments.  

When a user requests access to a service like a web application, that request
results in a service ticket that is encrypted with a key derived from the
service account’s password. In a Kerberoasting attack, bad actors target these
encrypted service tickets and attempt to crack the underlying password using
various techniques. If they succeed, they could then use their access to the
service account to steal sensitive data, manipulate services or move laterally
within the network, depending on the account’s privileges.  

7. SILVER TICKET 

In these attacks, bad actors use stolen credentials to create a forged
authentication ticket. More specifically, they create forged Kerberos Ticket
Granting Service tickets or TGS. These encrypted and forged tickets appear
authentic to a targeted service. Once inside the service, they can impersonate
another user, access resources and potentially escalate privileges. (They can
also move on to create a golden ticket, as explained below.)  

Unlike other identity-based attacks that involve the Kerberos protocol, silver
ticket attacks do not involve interaction with the central authentication
service or Key Distribution Center (KDC). This makes it harder to detect
suspicious activity at the authentication source. 

8. GOLDEN TICKET 

This ticket won’t get you into Willy Wonka’s Chocolate Factory (unless the
factory is vulnerable to this type of attack). But it can help bad actors gain
sweeping access to a company’s domain by accessing user data stored in Active
Directory. Like Kerberoasting and silver ticket identity attacks, the golden
ticket approach seizes on weaknesses in the Kerberos protocol. It allows
attackers to bypass normal authentication. 

In a golden ticket attack, attackers forge Kerberos tickets known as Ticket
Granting Tickets, or TGTs. Critical steps in this process include gaining access
to the krbtgt account’s NTLM hash, which is used to encrypt TGTs. (The krbtgt
account is a default account that exists in all AD domains.) The NTLM hash is a
sensitive credential held by the domain controller and used to create valid
TGTs. 

A golden ticket truly is worth its weight in gold to attackers. It contains the
identity information of a fictional user with arbitrary privileges as well as
provides long-term access. Once the attacker has this ticket, they can present
it to the KDC for authentication without the need to compromise actual user
credentials. And golden ticket identity attacks give bad actors a way to
maintain unauthorized access to a network even if legitimate user passwords are
changed.  


PREVENTION TECHNIQUES TO AVOID IDENTITY ATTACKS 

So, you’re probably wondering what you can do to help prevent these types of
identity-based attacks. There are multiple security controls that will help.
Here are some examples: 

IMPLEMENT MULTIFACTOR AUTHENTICATION (MFA) 

This is a powerful defense measure against identity attacks. MFA makes password
cracking much harder for attackers by adding an extra layer of security, like
one-time tokens or biometrics, beyond just using a username and password. Even
if an attacker steals a user’s password, they still won’t have access to the
secondary authentication method, in most cases.  

Keep in mind, though, that crafty bad actors have been turning to other methods,
like MFA fatigue attacks, to bypass MFA—and they are finding success. MFA is
important, but not sufficient to stop even moderately sophisticated attackers. 

STRENGTHEN AUTHENTICATION PROTOCOLS 

Enhance your authentication protocols to prevent Kerberoasting, silver ticket
and golden ticket attacks. In addition to using MFA, some of the many strategies
you can employ include: 

 * Rotating encryption keys regularly 
 * Enforcing strong password policies 
 * Reducing the maximum lifetime of tickets 
 * Instituting account lockout policies 
 * Monitoring and analyzing authentication events 
 * Conducting regular security audits 
 * Securing krbtgt accounts more aggressively 
 * Updating and patching systems 
 * Following the principle of least privilege (PoLP)  

PROVIDE TARGETED CYBERSECURITY AWARENESS TRAINING TO USERS 

The human element plays a vital role in the success of identity-based attacks.
So, help turn your users into better defenders. After all, they are on the front
line when it comes to many identity threats. 

With targeted security awareness training, your users can learn to spot phishing
attacks and find out how to resist social engineering tactics.  

Equally important, you can use training to instruct your users on how to report
suspicious activity. You can also emphasize the need to move fast if they think
they’ve been tricked by an attacker. Every second counts when identity-based
attacks are in motion and bad actors have found a way to breach your AD and
other critical services, systems and applications. 


HOW PROOFPOINT CAN HELP YOU COUNTER THE RISK OF IDENTITY THREATS—AND STOP
IDENTITY ATTACKS 

Identity-based attacks are a go-to strategy for many cybercriminals today. Given
the high rate of their success, that’s unlikely to change. But using the
techniques outlined above can go a long way toward helping you to strengthen
your defenses. 

Proofpoint Identity Threat Defense is another measure to consider. It is a
recent product innovation in a security space referred to by Gartner as identity
threat detection and response (ITDR). Proofpoint can help you discover identity
vulnerabilities and detect and respond to attacks in real time with automated
remediation and responses. The Proofpoint Identity Threat Defense platform
includes:  

 * Proofpoint Spotlight, which can help you to discover and remediate identity
   vulnerabilities on endpoints and in your identity repositories  

 * Proofpoint Shadow, which can help you detect and stop attackers before they
   know that you’re onto them  

If you’d like to learn more about how your business can counter the risk of
identity threats, download our e-book, Identity Threat Detection and Response:
Challenges and Solutions. 

Previous Blog Post
Next Blog Post


SUBSCRIBE TO THE PROOFPOINT BLOG

*
Business Email:




















Submit
*
Business Email:




















Submit
Products
 * Protect People
 * Defend Data
 * Mitigate Human Risk
 * Premium Services

Get Support
 * Product Support Login
 * Support Services
 * IP Address Blocked?

Connect with Us
 * +1-408-517-4710
 * Attend an Event
 * Contact Us

More
 * About Proofpoint
 * Why Proofpoint
 * Careers
 * Leadership Team
 * News Center
 * Privacy and Trust

© 2024. All rights reserved.
Terms and conditions Privacy Policy Sitemap
 * 
 * 
 * 
 *