Undetected privilege escalation occurs when an attacker infiltrates a network without being noticed and elevates their access rights to inflict damage on more highly guarded systems or data. Every new privilege escalation allows attackers to exploit new vectors, ultimately leading to complete control of the system.
How and Why Does Undetected Privilege Escalation Occur?
An undetected privilege escalation attack can occur when essential cybersecurity measures are lacking. Typically, an undetected privilege escalation attack will target a low-level user to avoid scrutiny and evade stronger security measures that may be in place for more high-value users. This can occur because of:
Since differing levels of identity privilege can be allotted depending on the user (role-based permissions), geography (location-based permissions), and device (device-based permissions), attackers have their pick of vectors to exploit initially.
Horizontal versus Vertical Privilege Escalation
There are two kinds of privilege escalation: horizontal and vertical.
Horizontal privilege escalation occurs when an attacker compromises an account other than the one that was initially compromised (an account takeover). The secondary account typically has similar privileges. This is done because the attacker wants access to additional resources available under that other account – not necessarily climbing the privileges ladder. Horizontal privilege escalation is an example of lateral movement and preys on standard user accounts with generally low-level security protections.
Vertical privilege escalation is when an attacker leverages the account access they already compromised and attempts to elevate the permissions of that compromised account. This typically requires more advanced, sophisticated measures as the goal is to obtain administrative access or root permissions, taking over a system completely.
With total system control, threat actors can install software, alter configurations, and destroy or exfiltrate data. These types of attacks are often classified as Advanced Persistent Threats for their ability to lie undetected on the network for long periods of time without detection.
Privilege escalation attacks occur commonly, but they do not have to be undetected. They can be prevented by:
If the attacker has already gained initial entry, a privilege escalation attack can be stopped by detecting it within the network as soon as possible. This can be done by using tools – like Endpoint Detection and Response (EDR)What is EDR? Endpoint Detection and Response (EDR) is a cybersecurity solution that proactively identifies and responds to threats to devices on a network, including desktop PCs, laptop PCs, mobile devices… More or Extended Detection and Response (XDR)What is Extended Detection and Response (XDR)? Extended detection and response (XDR) is a unified security platform that employs AI and automation to help entities detect, investigate, and respond to sophisticated… More – that leverage behavioral analysis to spot indicators of compromise within complex digital environments.
Want to know more? Test your knowledge with these 21 essential cybersecurity terms you should know.