A cyberattack technique where an attacker gains elevated access to resources that are normally protected, moving from a lower-privilege account to higher-privilege access such as administrator or root.
Privilege escalation is the act of exploiting vulnerabilities, design flaws, or misconfigurations to gain elevated access to resources that should be restricted. It is a critical step in most cyberattack chains, as initial access often comes through a low-privilege account.
Types of privilege escalation:
Common escalation techniques:
Prevention strategies:
Privilege escalation is a pivotal stage in cyberattacks. If an attacker gains admin access, they can access all data, install persistent backdoors, and disable security controls. Limiting and monitoring privilege is essential to containing breach impact.
Clever Ops helps Australian businesses prevent privilege escalation by implementing least-privilege access policies, Privileged Access Management solutions, regular privilege auditing, and monitoring for unusual privilege usage. We eliminate standing admin access in favour of just-in-time privilege elevation.
"An attacker compromises a standard user account via phishing but is unable to escalate privileges because the organisation uses PAM with just-in-time admin access, all systems are patched, and privilege usage is monitored. The attack is contained to a single low-privilege account."