Skip to content

Discover why insider threats have overtaken external attacks and how AI is making them harder to detect — Read the Release

Privilege Escalation Detection: The Key to Preventing Advanced Attacks

  • Jan 30, 2020
  • Orion Cassetto
  • 5 minutes to read

Table of Contents

    Cybersecurity threats are becoming increasingly sophisticated, and organized groups of hackers are carrying out advanced attacks against attractive targets. A key component in almost all advanced attacks is privilege escalation — an attempt to compromise an account, and then expand the attacker’s privileges, either by gaining control of more accounts or increasing the privilege level of the compromised account.

    Read on to understand how privilege escalation works, how to detect it in your organization, and how to protect your systems and stop advanced attacks before they reach your most sensitive assets.

    In this article, we provide you with information about insider threats, including what is an insider threat, the indicators that can help you detect insider threats and the best tools to provide protection against such threats.

    What is privilege escalation?

    Privilege escalation involves an attacker gaining access to an account, and finding a way to increase the level of privileges associated with that account (vertical), leverage their access to gain access to other user accounts (horizontal), or both.

    Privilege escalation attacks are used to gain access to networks, typically with the aim of exfiltrating data, disrupting business activity, or installing backdoors to enable continued access to internal systems.

    Horizontal vs vertical privilege escalation

    Horizontal privilege escalation is limited because it does not grant the attacker more powerful permissions, unless the attacker already possesses a privileged account. Vertical privilege escalation is typically more dangerous, because it means the attacker is trying to elevate their permissions, with the ultimate goal of gaining administrator or system user rights on Windows, or root on Unix systems.

    With root access, the attacker can steal credentials and other sensitive information, execute backdoors and other malware, erase data and otherwise disrupt business operations, or execute arbitrary code. Attackers can also cover their tracks by deleting evidence of their activity.

    Detecting privilege escalation incidents

    There are a few data points that can help detect and respond to privilege escalation attacks:

    Initial access pointWhich account or system did the attacker initially compromise?
    Initial threat vectorHow did the attacker compromise the initial account?
    Escalation pathWhat additional privileges did the attacker manage to obtain?
    Target systemsWhich accounts or systems did the attacker aim to attack and for what purpose?
    Damage causedWhat did the attacker manage to do after gaining access to the target systems?

    Privilege escalation and lateral movement

    For an attacker, privilege escalation is not a standalone measure. It is typically part of a technique known as lateral movement, which takes place following the compromise of an endpoint. The attacker will typically combine privilege escalation with an attempt to move laterally across the networks to compromise additional systems and accounts.

    Here is a typical lateral movement process:

    1. External reconnaissance—identifying opportunities for initial access points to the organization, whether via vulnerable systems or ports, social engineering, credential dumps, etc.
    2. Initial infiltration—the attacker uses the identified security weakness to gain access to an endpoint on the target’s network.
    3. Internal reconnaissance—the attacker gains information about the network, operating systems and other resources, conducts scans and looks for vulnerabilities they can exploit from the inside.
    4. Privilege escalation—the attacker uses their initial hold on the network to gain access to additional systems, using techniques like keyloggers, network sniffers, brute force guesses, or phishing, made more convincing by their control of internal accounts.
    1. Compromise more systems—attackers can use remote control tools such as psexec, PowerShell, or remote access software to access additional systems. These attempts may not arouse suspicion because remote access tools are commonly used by IT staff. Finally, the attacker will reach their end goal, such as the exfiltration of sensitive data.

    6 ways to protect your systems from privilege escalation

    The following are a few important best practices that can reduce the chance of successful privilege escalation attacks.

    1. Password policies
    It is essential to ensure users select unique, secure passwords and force them to change passwords periodically. Because this is difficult to enforce in practice, a good way to circumvent the insecure nature of passwords is to apply two-factor authentication, especially for sensitive systems and administrative accounts.

    2. Specialized users and groups with minimum privileges
    Review your user base and redefine user accounts and groups to ensure they have clear roles, applying the minimum necessary privileges and file access to each role. By doing this, you ensure that even if an account is compromised, the potential for privilege escalation is severely limited. This applies to all accounts — even admins and super-users should have limited access to the systems they are actually supposed to access or manage. No administrator should have broad permissions for most or all network systems.

    Most importantly — remove user accounts when they are no longer needed, and have a clear, mandatory procedure for dealing with employee departure.

    3. Close unused ports and limit file access
    Network ports should be blocked by default and only allowed if they are really needed for legitimate applications. Identify default configurations that have unnecessary services running, and block them. In the same way, files should be read-only, with write access only enabled for users and groups who actually need them.

    4. Secure databases and sanitize user inputs
    Many database systems have insecure defaults, so special care must be taken to ensure databases are secured and protected by strong authentication. Data at rest should be encrypted whenever possible. Sanitize all user inputs and patch databases to prevent SQL and other code injection attacks.

    5. Keep your systems and applications patched and updated
    Many privilege escalation attacks leverage software vulnerabilities to gain initial access. Use vulnerability scanners to identify known vulnerabilities in your applications, and rigorously apply security patches to remediate them.

    Because it is not always possible or practical to patch or update systems, especially large-scale production systems or legacy components, you may need to apply additional layers of security. For example, a web application firewall (WAF) can identify and block malicious communication related to a vulnerability exploit at the network level, even if the underlying system was not patched.

    6. Change default credentials on all devices
    Be sure to remove or rename default and unused user accounts. Change the default login credentials for any hardware system, including printers, routers, and IoT devices. A single device with default credentials and an open network port can become an initial access point for an attacker, leading to a privilege escalation attack.

    Advanced protection with next-generation SIEM and UEBA

    The Exabeam Security Management Platform is a next-generation security information and event management (SIEM), powered by user and entity behavior analytics (UEBA). Exabeam can ingest logs from security tools and IT systems, identify anomalous behavior, and stitch it together with contextual data to identify security incidents. It creates a smart timeline that shows the full path of a malicious user, with both normal and abnormal behavior performed using different user accounts and machines on the network.

    Exabeam uses UEBA to create a baseline of normal behavior, making it easy to detect anomalous behavior that might signal an attack. Exabeam can assemble the complete timeline of a privilege escalation attack in minutes, without requiring a manual investigation by security analysts.



    Figure 1 – An example of a lateral movement detection without and with Smart Timelines

    Read more in our blog post about detecting and preventing lateral movement and privilege escalation with Exabeam.

    Want to learn more about Cybersecurity Threats?
    Have a look at these articles:

    Orion Cassetto

    Orion Cassetto

    Sr. Director of Product Marketing | Exabeam | A seasoned marketing leader with over a decade and a half of experience marketing cyber security solutions to enterprise buyers. I believe in telling unique and powerful product stories that speak to buyers, that great content is the cornerstone of every world-class marketing organization; and that effective marketing starts with great messaging. Throughout my career, I have repeatedly built and led successful marketing teams that support high growth businesses and trained world-class sales teams.

    More posts by Orion Cassetto

    Learn More About Exabeam

    Learn about the Exabeam platform and expand your knowledge of information security with our collection of white papers, podcasts, webinars, and more.

    • Blog

      Enabling OJK Regulatory Compliance and Cyber Resilience for Indonesia’s Banking and Financial Sector With Exabeam

    • White Paper

      Architecting Threat Detection, Investigation, and Response (TDIR)

    • White Paper

      A CISO’s Guide to Rethinking Insider Risk

    • Video

      Automated Threat Timelines

    • Video

      Exabeam Nova: End-to-End AI

    • Video

      Open and Agnostic Security Operations With the New-Scale Platform

    • Show More