Closing Credential Security Gaps
The Singularity Identity solution prevents lateral movement from the endpoint by anticipating attack techniques and ambushing the attacker’s every move. The solution detects and responds to identity-based attacks and finds attackers early, before they can exploit identities. It protects credentials at the endpoint by hiding and binding the credential stores to the applications that own them, thus preventing unauthorized access and misdirecting the attacker with fake credentials. Additionally, deceptive credentials serve as breadcrumbs stored on user systems and servers in credential storage and memory. These deceptive breadcrumbs include local or domain administrator accounts, decoy hashes, access tokens, Kerberos tickets, etc. The solution’s fake file shares lead to decoy servers on the network hosted by the Singularty Hologram solution. When attackers attempt to steal the locally stored credentials using Mimikatz or a similar tool, they will take the fake credentials, which lead to decoys on the network. If they follow the bait and lures, they will engage with the decoys, which generate alerts while recording their activities to develop adversary intelligence.