2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyber Defenses

SBWebinars 136 views 31 slides Nov 27, 2018
Slide 1
Slide 1 of 31
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31

About This Presentation

Curious about what hackers really think of your cyber defenses? Thycotic’s new 2018 Black Hat Conference survey conducted in Las Vegas in August reveals some disturbing answers.

75% hackers say companies fail at applying the principle of least privilege
50% of hackers say they easily compromised ...


Slide Content

Privileged Access Management 101
What Hackers Really Think About Your Cyber Defenses

17,000 Security Professionals
BLACK HAT CONFERENCE 2018

Google’s Security Princess
delivering the Keynote

Detecting Credential Compromise in
AWS

From Workstation to Domain Admin

“So I Became a Domain Controller”

Privileged Access Management 101
What Hackers Really Think About Your Cyber Defenses

50% of Hackers Easily Conquered Windows OS in the Past Year
Windows1027%
Windows822.5%
BASED ON SURVEY QUESTION:
Which OS did you conquer the
most in the past 12 months?
Less than 5% of hackers listed Mac OS,
Unix, and Mobile devices as
compromised.
Alsoidentifiedaseasilyconquered:
LinuxOS18%

say traditional perimeter security
firewalls and antivirus are irrelevant
or obsolete73
%
OF HACKERS SAY

56% of Hackers say
Social
Engineering is the
fastest way to
access privileged
accounts
SocialEngineering56%
Application/
OSVulnerability20%
IdentityTheft10%
Malware,
StolenEndpoints<7%
BASED ON SURVEY QUESTION:
What’s the fastest way to get
onto a network to access
privileged accounts?

Phishing Scams
Not an
attachment
but hyperlink

Password Re-Useis the riskiest behavior by employees
Re-usedpasswords47%
UsingUSBdrives
Withoutscanning20%
Accessviapublicwifi19%
Malware,
StolenEndpoints<7%
BASED ON SURVEY QUESTION:
What’s risky behavior do you
exploit the most?

91% of Hackers
Conquer Windows
Environments
Despite Using
Group Policy
Objects
Yes,usingMimikatz43%
Yes,easily26%
Yes,passwordsinSYSVOL
&GroupPolicyPreferences22%
BASED ON SURVEY QUESTION:
Do you exploit companies
using Microsoft GPO?

Default Vendor PasswordsAllow Hackers to Escalate Privileges
Defaultvendorpasswords22%
App/OSvulnerabilities20%
MisconfiguredserviceAccts18%
SocialEngineering17%
Sharedaccounts12%
Bruteforce7%
BASED ON SURVEY QUESTION:
What is the single best way to
typically escalate privileges?

Domain Admin AccountsAllow Hackers to RULE the Network
Domainadministrator25%
Serviceaccount19%
Rootaccount19%
BASED ON SURVEY QUESTION:
What is the primary type of
privileged account that you
prefer to target and stay hidden?

accessing privileged accounts was the
number one choice for the easiest and
fastest way to get at sensitive data32
%
OF HACKERS SAY

1.Adopt a zero trust posture
2.Don’t rely only on GPO for security
3.Apply the principle ofLeast Privilege
Black Hat 2018 Report Key Takeaways

üReduces Costs: Saves companies time and money
üEmpower Happy Employees: Reduce employee cyber
fatigue
üPositive Security Impact
üFast Track to Compliance: Automation and reduced
complexity
üKeeps Cyber Criminals Out
PAM: #1 Project in 2018

Ask Advice
Click Here

A Secure Internet
Starts With You
QUESTIONS

Thycotic prevents cyberattacks by securing
passwords, protecting endpoints, and controlling
access
10,000+
Customers
180,000
IT Admins &
Security Pros
1M+
Endpoints
Protected