Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Cyber Gang Targets Managed Service Providers (MSPs) to Gain Privileged Access

April 6, 2017

  • Blog
  • Archive

The PwC Operation Cloud Hopper Report released earlier this week by BAE Systems and PwC UK claims a China-based cyber gang called APT10 is responsible for a hacking campaign focused on managed IT service providers (MSPs).

According to the report, “APT10 has vastly increased the scale and scope of its targeting to include multiple sectors, which has likely been facilitated by its compromise of MSPs. Such providers are responsible for the remote management of customer IT and end-user systems, thus they generally have unfettered and direct access to their clients’ networks. They may also store significant quantities of customer data on their own internal infrastructure.”

The report indicated that APT10 has utilized spear phishing campaigns as a method of entry. The group is known to conduct significant research on targets to obtain company email addresses and craft relevant messages that will trick readers into downloading a malicious attachment or clicking a link to a malicious site.

Once the MSP is compromised, APT10 use the MSPs legitimate access and credentials to infiltrate client networks that match their targeting profiles. The researchers found, “In most cases, these stolen MSP credentials have provided administrator or domain administrator privileges.” From there the attackers can move laterally around the network and deploy credential theft tools, such as mimikatz or PwDump, to gain further credentials.

The Operation Cloud Hopper report drives home the importance for both MSPs and their clients to secure both the access needed to connect and the credentials needed to authenticate for all the clients’ systems.  The key is eliminating that “unfettered and direct access” to that most MSPs have today, without limiting speed or productivity or increasing the cost of service.

1. No VPN for Vendors: VPNs and other direct access methods give all or nothing, or unfettered, access to clients’ networks. If an attacker compromises an MSP’s VPN access, they can easily move laterally within a network without being detected. Instead, third-parties should be given access to clients’ systems through a secure remote access solution that only provides access the systems and applications they need, sets permissions on what they can do on those systems, and records a secure audit trail of all activity. 

Bomgar’s Remote Support and Privileged Access solutions allow vendors to quickly access client systems and efficiently perform tasks without requiring a VPN connection. MSPs can provide superior support while significantly reducing the risk of becoming an attack vector for their clients.

2. Lock up Client Credentials: Client credentials often need to be shared with multiple employees working for the MSP. Tools such as excel sheets are often used to store this information so that it can be easily accessible, but they are easy to compromise and expose plain text passwords. It can be a challenge to identify compromised accounts and manually rotate them.

Bomgar Vault allows MSPs to securely store, rotate, and randomize all client credentials. Admin passwords can be safely shared for various clients. And when used in conjunction with Bomgar Remote Support or Privileged Access, Bomgar Vault allows MSP employees to inject credentials into clients’ endpoints without exposing plain text passwords. This significantly reduces any chance of admin or domain admin credentials being phished.

Learn more about how Bomgar helps managed service providers and contact us today to learn how Bomgar can fit into your security profile.

Liz Shulof

Chief Marketing Officer

As Chief Marketing Officer, Liz Shulof is responsible for all aspects of Marketing, including Corporate Communications, Digital Marketing, Product Marketing, and Field Marketing. Shulof has more than 15 years of experience developing and managing strategic and marketing initiatives for B2B technology companies. Before joining BeyondTrust, Shulof served as Vice President at Greenough Communications, where she managed public relations programs for clients, including Quest Software, Numara Software, and IGEL Technology. Previously, Shulof spent more than five years in strategy and technology consulting with Accenture. She holds a Bachelor of Arts in Communications from Purdue University.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Webcasts | February 09, 2021

Customer Webinar: Remote Support 21.1 Released!

Webcasts | February 24, 2021

Your PAM 2021 Blueprint: Securing Privileged Accounts for On-Premises and Cloud Assets

Whitepapers

Evolving Privileged Identity Management (PIM) In The 'Next Normal'

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.