![Lead Image © Galyna Andrushko, 123RF Lead Image © Galyna Andrushko, 123RF](/var/ezflow_site/storage/images/archive/2019/53/credential-harvesting-at-the-network-interstice/po-25709-123rf-galyna_andrushko_123rf-b_r_schwimmt_in_wildem_wasser__resized.png/166677-1-eng-US/PO-25709-123RF-Galyna_Andrushko_123RF-B_r_schwimmt_in_wildem_Wasser__resized.png_medium.png)
Lead Image © Galyna Andrushko, 123RF
Credential harvesting at the network interstice
Where the Wild Things Are
Brute forcing the web browser and the conversations it has with Internet-based resources now seems to be the primary hacking method. Although many people still use their Microsoft Outlook clients, the web browser is where most users store their credentials to check email, log on to cloud services, use social media, and generally do what they do every day. This means the browser and its subsequent transactions are the main target of credential harvesters worldwide.
Credential harvesting is the practice of obtaining usernames and passwords illicitly and then either selling them to the highest bidder (often on the dark web) or handing them over to an attacker – a relatively new practice. (See the "Have I Been Harvested?" box.) Traditionally, hackers were interested in compromising systems either smash-and-grab style or as "full-stack" attackers trying to control systems through long-term advanced persistent threat (APT) techniques. These methods are really no longer the most popular. Many attackers simply focus on obtaining credential information, which can include usernames, passwords, and associated metadata, such as email addresses, connection data, and the equipment potential victims use every day.
Have I Been Harvested?
You can discover whether you've been harvested already by going to the Have I Been Pwned website [1] and conducting a simple search. This website is, in many ways, a Google-like service for anyone who is curious about whether their user credentials have been stolen. The site's operator has specialized crawlers, bots, and engines that obtain information about millions of hacked users and then place that information into a searchable database. You can search for websites and, for example, social media platforms that have been hacked recently by credential
Buy this article as PDF
(incl. VAT)