Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Credential Harvesting

Dictionary Term

Table of Contents
minLevel2
typeflat
  •  Compile bibliography

Alternative Forms

  • Harvesting

Definitions

Definition 1

Credential harvesting designates is a class of attacks characterized by the collection of identity attributes and credentials with the objective of compromising their linked identities.

Credential harvesting may be subdivided into two subclasses:

  • Credential harvesting in the reconnaissance phase of an attack where identity attributes such as email addresses or login ids are guessed or collected from available data sources. Often, the confidentiality of these identity attributes cannot be effectively assured but they are not sufficient to exploit the identities.

  • Credential harvesting in preparation for the exploitation phase of an attack where identity attributes or credentials such as passwords or session tokens are collected to enable the compromise of

    cyberattacks characterized by collecting information on available authentication mechanisms (e.g., identity attributes, certificates, credentials, and sessions) to leverage this information to compromise information security domains and/or abuse identities.

    Credential harvesting opportunistically seeks to find exploitable authentication solutions. It is distinct from attacks that target specific identities.

    Credential harvesting may be designated by the identity attribute that is being harvested, e.g.: email addresses harvesting or password harvesting.

    Example identity attributes or credentials that may be collected as part of credential harvesting are:

  • Certificates

  • Email address

    used during various attack stages, including reconnaissance, initial exploitation, privilege escalation, and lateral movement.

    Information collected by credential harvesting pertains to authentication-related information types that may be leveraged for exploitation, such as identity attributes, credentials, or session information. This comprises:

    • Email address

    • Login ID

    • Password

    • Password hash

    • Session token (e.g. web cookies or web parameters)

    Example classes of actors who may engage in credential harvesting:

    • Bots

    • Humans

    • Worms (ex: Nimba)

    Example data sources used to harvest credentials:

    • Configuration files (e.g. plaintext passwords)

    • Private key

    • Session ID

    • SSH key

    The data sources from where credential information may be harvested vary. Typical ones are:

    • Address books

    • Browser history

    • Computer memory (e.g., cached credentials, login ids, plaintext passwords, session tokens)

    • Configuration files

    • Databases

    • Documents (e.g., email addresses, login ids, passwords)

    • Email or application services that allow guessing attributes/dictionary attacks

    • Identity repositories (e.g., LDAP, Windows Active Directory)In-memory data (e.g. login ids, plaintext passwords, session tokens)

    • People (through social engineering)

    • Phishing or trojan websites (e.g., login ids, passwords, second authentication factor)

    • Reusable identity attributes or credentials obtained from previous data breaches

    • Web cookies

    • Web query parameters

    • Web sites, social networks, and forums (e.g., email addresses via web scraping)

    • Windows registry

    Among these, some information may be publicly or easily available (e.g., email addresses that may be collected by web scraping on public websites or forums while others may be protected and harder to reach, e.g., cached credentials stored in computer memory.

    The collected information may be insufficient for exploitation and may need to be complemented with other techniques (e.g., executing a dictionary attack on harvested password hashes).

    Credential harvesting may be designated by the identity attribute or credential that is being harvested. Password harvesting specifically focuses on passwords. Email harvesting is a specialized and limited form of credential harvesting frequently used for phishing purposes.

    Information may be collected:

    • by accessing it directly (e.g., when it is publicly or easily available (e.g., email addresses collected by web scraping or scanning configuration files),

    • by hacking it (e.g., accessing live memory to read cached credentials)

    • by guessing it (e.g., email addresses or login ids)

    Threat actors engaging in credential harvesting may vary. They include:

    Example countermeasures that may be effective against credential harvesting comprise:

    Canary identities

    include:

    • Access controls / need-to-know

    • Deception (canary identities, honeypots)

    • Disabling credential caching

    • Digital Rights Management (DRM)

    • Encryption

    • Hardware Security Module (HSM)

    • Multi-Factor Authentication (HSMMFA)

    • Not reusing passwords

    • Password Managers

    • Privileged Access Management (PAM)

    • Security awareness programSecuring confidential informationprograms

    • System hardening

    Sample Sentences

    Eve, the hacker, tricked Bob, the user, by cleverly forging a spearphishing email. When Bob clicked on that link, he did not notice anything unusual but his laptop got compromised. Once in, Eve started to harvest credentials with the intention to make a lateral movement within Bob’s corporate network. Luckily for her, she quickly found the cached credentials of Alice, an engineer from the IT support team who previously logged in on Bob’s laptop to help him with a technical issue.

    Conceptual Diagram

    Image Added

    Related Terms

    • Password

    • Worm

    Quotes

    Expand
    Doe, 2050
    titleAlbanese and Sonnenreich, 2004, p. 110
    Include Page
    QUOT:Albanese and Sonnenreich, 2004, p. 110
    QUOT:Albanese and Sonnenreich, 2004, p. 110
    Expand
    titleAlbanese and Sonnenreich, 2004, p. 164-165
    Include Page
    QUOT:Albanese and Sonnenreich, 2004, p. 164-165
    QUOT:Albanese and Sonnenreich, 2004, p. 164-165
    Expand
    titleAnderson, 2020, p. 58
    Include Page
    QUOT:Anderson, 2020, p. 58
    QUOT:Anderson, 2020, p. 58
    Expand
    titleBenantar, 2006, p. 127
    Include Page
    QUOT:Benantar, 2006, p. 127
    QUOT:Benantar, 2006, p. 127
    Expand
    titleBradley, 2019, p. 1
    Include Page
    QUOT:DoeBradley, 20502019, p. 1
    QUOT:DoeBradley, 20502019, p. 1
    Expand
    titleBrotherston and Berlin, 2017, p. 189
    Include Page
    QUOT:Brotherston and Berlin, 2017, p. 189
    QUOT:Brotherston and Berlin, 2017, p. 189
    Expand
    titleCavalancia, 2021, p. 9
    Include Page
    QUOT:Cavalancia, 2021, p. 9
    QUOT:Cavalancia, 2021, p. 9
    Expand
    titleCERT/CC, CA-2001-26, 2001, p. 130
    Include Page
    QUOT:CERT/CC, CA-2001-26, 2001, p. 130
    QUOT:CERT/CC, CA-2001-26, 2001, p. 130

    Bibliography

    See Also

    Filter by label (Content by label)
    showLabelsfalse
    sorttitle
    cqllabel = "credential-harvesting"