Unfortunately, users are the weakest link in the security chain. With just a single click, they could compromise a system or network.
To mitigate this risk, businesses implement security awareness programs along with a methodology for validating the effectiveness of the training.
In most cases, phishing simulation software, like KnowBe4, GoPhish, or Phishme can adequately train users to identify phishing email attempts.
Privilege escalation, like other cyber attacks, takes advantage of system and process vulnerabilities.
In order to prevent these attacks, consider implementing proper processes for patch management, new software development/implementation, and user account modification requests as well as an automated tool to monitor for such changes.
Implementing these process will give you the proper safeguards in place to prevent or deter and attacker from attempting privilege escalation.
Finally, an intrusion detection system (IDS) and/or intrusion prevention system (IPS) provide an additional layer of security to derail attempts at escalating privileges.
New exploits are being created daily and it is our responsibility to ensure we protect ourselves from the attack.
A proper patch management process will help ensure all systems and applications are current with the latest patches.
During the quest for new and improved software, we must not forget to include security in the process.
Oftentimes, security is set aside to meet the business or client needs.
Software code reviews or vendor management processes will help keep security in the loop and strengthen your development practices.
During the attack, the attacker may try to elevate their permissions with a phone call or service ticket request to the helpdesk.
Without a proper process in place to validate the user’s request, this may go unnoticed until an access level review is conducted.