skip to main content
10.1145/2699026.2699127acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
poster

One Thing Leads to Another: Credential Based Privilege Escalation

Published:02 March 2015Publication History

ABSTRACT

A user's primary email account, in addition to being an easy point of contact in our online world, is increasingly being used as a single point of failure for all web security. Features like unlimited message storage, numerous weak password reset features and economically enticing spoils (in the form of financial accounts or personal photos) all add up to an environment where overthrowing someone's life via their primary email account is increasingly likely and damaging. We describe an attack we call credential based privilege escalation, and a methodology to evaluate this attack's potential for user harm at web scale. In a study of over 9,000 users we find that, unsurprisingly, access to a vast number of online accounts can be gained by breaking into a user's primary email account (even without knowing the email account's password), but even then the monetizable value in a typical account is relatively low. We also describe future directions in understanding both the technical and human aspects of credential based privilege escalation.

References

  1. Anderson, R., Barton, C., Böhme, R., Clayton, R., van Eeten, M., Levi, M., Moore, T., and Savage, S. Measuring the cost of cybercrime. In WEIS (2012).Google ScholarGoogle Scholar
  2. Danchev, D. Hacked origin, uplay, hulu plus, netix, spotify, skype, twitter, instagram, tumblr, freelancer accounts offered for sale. http://www.webroot.com/blog/2013/06/07/hacked-origin-uplay-hulu-plus-netflix-spotify-skype-twitter-instagram-tumblr-freelancer-accounts-offered-for-sale/, 2013.Google ScholarGoogle Scholar
  3. Federal Bureau of Investigation. International cooperation disrupts multi-country cyber theft ring. http://www.fbi.gov/news/pressrel/press-releases/international-cooperation-disrupts-multi-country-cyber-theft-ring, October 2010.Google ScholarGoogle Scholar
  4. Florencio, D., and Herley, C. Is everything we know about password stealing wrong? Security & Privacy, IEEE 10, 6 (2012), 63--69. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Franklin, J., Perrig, A., Paxson, V., and Savage, S. An inquiry into the nature and causes of the wealth of internet miscreants. In ACM conference on Computer and communications security (2007), pp. 375--388. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Holz, T., Engelberth, M., and Freiling, F. Learning more about the underground economy: A case-study of keyloggers and dropzones. Springer, 2009.Google ScholarGoogle Scholar
  7. Honan, M. How apple and amazon security aws led to my epic hacking. http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/all/, Aug 2012.Google ScholarGoogle Scholar
  8. Krebs, B. The scrap value of a hacked pc. http://voices.washingtonpost.com/securityfix/ 2009/05/the_scrap_value_of_a_hacked_pc.html, May 2009.Google ScholarGoogle Scholar
  9. Moore, T., and Clayton, R. Examining the impact of website take-down on phishing. In Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit (2007), ACM, pp. 1--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. van Kloeten, O., and Tabachnik, I. Plain text offenders. http://plaintextoffenders.com/, 2012Google ScholarGoogle Scholar

Index Terms

  1. One Thing Leads to Another: Credential Based Privilege Escalation

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CODASPY '15: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
          March 2015
          362 pages
          ISBN:9781450331913
          DOI:10.1145/2699026

          Copyright © 2015 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 2 March 2015

          Check for updates

          Qualifiers

          • poster

          Acceptance Rates

          CODASPY '15 Paper Acceptance Rate19of91submissions,21%Overall Acceptance Rate149of789submissions,19%

          Upcoming Conference

          CODASPY '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader