Rapid7, Inc.
CONTAINING COMPROMISED CREDENTIALS USING DECEPTION SYSTEMS

Last updated:

Abstract:

Disclosed herein are methods, systems, and processes for containing compromised credentials using deception systems. A request to authenticate a credential is received at a honeypot and a determination is made that the request includes context information that correlates the credential with network components that are part of the network. A protected host in the network associated with the credential is identified and the credential is authenticated by validating the credential with the protected host. A determination is made that the credential is compromised and the credential is deactivated.

Status:
Application
Type:

Utility

Filling date:

9 Mar 2022

Issue date:

23 Jun 2022