Introducing the Crowdstrike API Key Canarytoken

Adversaries love (ab)using security software – why wouldn’t they? Security software as a target Security tooling is widely deployed, typically controllable remotely, and usually runs with elevated privs. This makes attackers greedy for credentials to security back-ends, and we can exploit that greed! In this post we introduce our latest Canarytoken: the CrowdStrike API Key Adversaries are always on the lookout for credentials, and by placing decoy keys in their path it’s possible to detect them early.  They love API

Continue Reading

Site Footer

Authored with 💚 by Thinkst