DETECTION OVERVIEW
Risk Factors
The likelihood of privilege escalation increases after a device has been compromised earlier in the attack chain and when there are poor security controls for remote access services on the network. Time and skills are required to exploit weaknesses in services that run over remote control protocols such as Secure Shell (SSH), Remote Desktop Protocol (RDP), or Windows Management Instrumentation (WMI). If an attacker achieves privilege escalation, this means that the attacker is close to taking action on their ultimate objective, such as exfiltrating or compromising the integrity of important data.
The system might change the risk score for this detection.
Kill Chain
Risk Score
65
After a client or workstation with limited privileges is compromised by an attacker through malware or an exploit, the attacker can search for critical assets to compromise from inside the network. Because critical assets are likely protected with strict permissions to prevent unauthorized access, the attacker must find a way to escalate the privileges of the compromised device, which they now control.
An attacker can escalate the privileges of a device through a lack of security controls on remote access services. Evidence of privilege escalation can point to the lateral movement phase of a potentially large attack campaign.
Disable remote access services that are not required
Implement strong authentication methods for remote access services
Regularly apply software updates
Implement network segmentation and firewall policies to limit how devices can communicate and enforce security zones
Implement devices that manage access through a separate security zone, such as jump servers or bastion hosts, which limit the scope of remote access and provide strong authentication and auditing
Review access controls to ensure that only the necessary users can connect to remote access services
Review authentication methods and enforce policies for secure credential creation and multi-factor authentication