- Palo Alto Networks

CREDENTIAL-BASED ATTACKS:
Exposing the Ecosystem and Motives Behind Credential
Phishing, Theft and Abuse
REPORT BY JEN MILLER-OSBORN
PALO ALTO NETWORKS | 4401 Great America Parkway | Santa Clara, CA 95054
www.paloaltonetworks.com
Introduction
Passwords are the classic “something you know” authentication factor and have
been used for centuries to verify a person. Initially a password was given in a face-toface exchange and was intended to ensure the person meant no harm or was on the
same side. Using passwords, sentries would challenge those attempting to access
a military encampment; speak-easies would try to keep out law enforcement; and
children would keep grown-ups out of clubhouses.
When passwords are combined with usernames, they form the credentials that are now
everywhere in our digital age. Nearly everything you do online requires you to create
credentials. Whether it’s one of your email, bank or credit card accounts; a video game
or other streaming service; your new refrigerator or thermostat; or even an electric
toothbrush, each and every one of these accounts requires a username and password.
To be secure, you’re expected to give each of these accounts a strong, unique password
that you change regularly and store in such a way that attackers could not make use of it
if stolen. And frequently you’re supposed to create a unique username as well.
That’s the theory. Unfortunately, the reality is much different.
Too many usernames are hard to remember. Strong, unique passwords are difficult
to both create and remember without specialized software. Changing these
passwords regularly only compounds that problem exponentially. When most of us
need to keep track of more than five sets of unique credentials, the task becomes
almost impossible. Add to this challenge the many issues faced by applications
and organizations to store passwords properly, and you have a much more difficult
security situation.
The 2016 Adults’ media use and attitudes study by Ofcom, the U.K. communications
watchdog, shows how bad the password reality is. They note that “[f]our in ten
internet users say they tend to use the same passwords for most websites.”
They’re not just saying they reuse passwords, but that they use the same passwords
for most websites. In reality, this means that many users are using one or two
passwords for most of their online credentials.
Given that reality, it’s perhaps not surprising that the Verizon 2014 Data Breach
Investigations Report (DBIR) said two out of three attacks involved compromised
credentials. And in 2016 the DBIR noted 63 percent of confirmed data breaches
leveraged credentials; use of stolen credentials is the most common approach in
web-app attacks.
PA L O A LT O N E T W O R K S
+
C R E D E N T I A L - B A S E D AT TA C K S
2
Hacking:
Use of stolen creds
1,095
Malware:
Export data
1,031
Malware:
C2
980
Social:
Phishing
847
Malware:
Spyware/keylogger
841
Incident count
Figure 1 + Top threat action varieties within incidents involving credentials
You don’t need a zero-day attack or to be an advanced persistent threat (APT) to
empty a bank account, compromise a network, or cripple a company. All you need
are the right credentials. Legitimate credentials are a ticket through the front door of
every account and organization on the planet, regardless of whether the person using
them is their owner or someone who stole them.
Stealing credentials doesn’t necessarily require any level of technical ability,
and attackers can even rent the necessary tools, like keyloggers and Trojans, in
underground forums, as well as purchase already stolen – and in many cases verified
as working – credentials for every type of account imaginable.
Arguably the most crucial component in the success of any malicious digital activity
is the ability to obtain and use legitimate credentials. When attackers are developing
the playbook they will execute in an attack, credentials are often involved either as a
target of theft or as a means to furthering access in a network at every phase of the
attack lifecycle. Credentials are the oxygen of malicious activity: nearly always there,
nearly always necessary, and nearly ever noticed. Rob Joyce, the head of the U.S.
National Security Agency’s Tailored Access Operations (TAO) group gave a public talk
at a security conference in January 2016 and noted stolen credentials are primarily
how he and his team get into networks, versus the use of zero days.
Publicly reported, high-profile data breaches support the idea that stolen credentials
are far more common a cause for a successful attack than zero days or APTs. The
most recent information on credential theft is also reportedly how hackers breached
the Target Corporation and The Home Depot in 2014, and the U.S. Office of Personnel
Management in 2015. Stolen credentials have even played a role in “hackers hacking
hackers”: the hacktivist who broke into the Italian zero-day and hacking tool provider
Hacking Team used stolen credentials. The next year, 2016, saw more massive breaches
at Dropbox, LinkedIn, Weebly and even MySpace. One breach in 2016 alone consisted of
over 1 billion records for multiple large email providers.
Credential reuse across accounts is such a prevalent issue that Amazon took
proactive steps to reset users’ passwords when user credentials were discovered
to have been compromised – and the credentials hadn’t been stolen from Amazon.
In addition, the recent Shamoon attacks relied on stolen credentials to gain access,
spread throughout the network, and wipe computers.
PA L O A LT O N E T W O R K S
+
C R E D E N T I A L - B A S E D AT TA C K S
3
A study published in 2016 by Bitglass demonstrated how quickly stolen credentials
are exploited. Bitglass researchers created a decoy Google Apps for Work profile for
a fictitious bank employee at a fictitious bank. The researchers then leaked Google
credentials related to Google Drive for this fictitious employee on the dark web as
though they had been phished. Within the Google Drive account, the researchers also
stored legitimate-looking files containing fictitious credit card information and work
data. Within 24 hours, not only had the decoy bank portal and Google Drive accounts
been accessed by hackers, but hackers also used credential stuffing to access other
decoy accounts created with the leaked credentials, including decoy social media and
personal bank accounts.
It’s no wonder then that a survey conducted in 2015 of security professionals around
the world by Rapid7 found 60 percent of companies felt they did not have security
measures in place capable of detecting or mitigating credential-stealing attacks.
That intent of restricting access to all but those authenticated, authorized few has
carried through into the digital age. However, as most of these transactions now
take place virtually, it is even more difficult to detect when the individual using them
is not the trusted person but an impostor. Credential theft has been a big problem;
how to detect and stop this digitally is a longstanding issue that cannot be addressed
with legacy security approaches. But, like any threat or attack, credential theft can be
prevented: new technology and software holds promise to finally, effectively prevent
credential theft.
This paper is meant to help defenders fight back against credential theft by outlining
how credential theft happens and what can realistically be done to prevent it.
How Attackers Steal Credentials
The first step toward preventing credential theft is to understand how it happens
in the first place. There are five primary techniques that attackers use for stealing
credentials:
1. Social engineering
2. Credential phishing and spam
3. Reusing stolen passwords or shared credentials
4. Brute force
5. Security question reuse
Below, we go into more detail on each of these.
Social Engineering
The Oxford English Dictionary defines social engineering as “the use of deception to
manipulate individuals into divulging confidential or personal information that may be
used for fraudulent purposes.” All manner of attackers use social engineering, from
hacktivists to criminals to spies. Social engineering typically occurs over email, with
leading email subjects and texts designed to encourage the user to click a link or
open an attachment.
PA L O A LT O N E T W O R K S
+
C R E D E N T I A L - B A S E D AT TA C K S
4
In some cases, attackers will use online chat with fake profiles to go after their targets,
attempting an additional layer of legitimacy. In 2015 Dell SecureWorks reported on suspected
state-sponsored activity that created fake LinkedIn profiles, which were in use by attackers.
A more recent report in The Washington Post showed the fundamentalist organization
Hamas using fake Facebook profiles to target Israeli soldiers. Attackers have also used social
engineering to obtain illicit account access by pretending to be the account owner, even calling
help desks to try to obtain legitimate credentials. This vector is successful enough that pen
testers often employ it when testing the security of a network. It was used in the notorious
HBGary Federal hack in 2011 and the 2015 hack of social networking site Xat.com, where the
hackers stole intellectual property as well as wiped servers and logs.
Credential Phishing and Spam
The most common way attackers steal credentials is via phishing, in which an email
message attempts to lure its recipient into logging into an account. The 2016 DBIR
noted roughly 30 percent of phishing messages are opened, and of those, 13 percent of
recipients opened the malicious file or clicked the hyperlink. The malicious links lead to
websites that look the same as the legitimate site, and often use a similar URL with one
or more typos as shown in Figure 2. Credential phishing has proven very effective and is a
staple tactic of the Sofacy threat actor group. Successful credential phishing is also widely
believed to be behind the well-publicized attacks against the United States Democratic
National Committee (DNC) in the summer of 2016.
Page mimicking legitimate site
https://mail.academl.com/owa/auth/logon.aspx?replaceCurrent=1&url=https%3a%2f2mail.as
Operation Pawn Storm
User enters credentials into phishing site
Sent to attacker
Figure 2 + Example of credential phishing attack
Attackers will also use phishing’s close relative – spam – to get people’s credentials. In
this case, attackers will use malware in spam email messages as their means of obtaining
usernames and passwords. For the victims who open malicious attachments, the malware
itself will often employ a keylogger, which records every keystroke made and sends them
to the attacker as shown in Figure 3. The Sofacy threat actor group has also targeted
credentials through malware like their XAgent tool against both Microsoft® Windows® and
Apple® macOS™ systems. Beyond simple keyloggers, attackers will also use a credentialharvesting program, such as Mimikatz or gsecdump, to steal any additional credentials
stored in memory on the device. It’s important to note that stealing credentials stored
within a system also applies to credentials saved in a web browser as attackers have tools
designed to steal those as well.
One important thing to consider is that when credentials are stolen through either
phishing or malware like keyloggers, the benefit offered by complex passwords is
PA L O A LT O N E T W O R K S
+
C R E D E N T I A L - B A S E D AT TA C K S
5
debatable, and offers no protection. It doesn’t matter if yours is a 35-character
random password with letters, numbers and extended characters or just “password”;
once it’s stolen in this way, the attacker has it, and the protections its complexity may
otherwise give you are not valid.
Attacker
DOC
DOC
DOC
You
Phishing Email
Exploit Document
Bac
kdo
o
DOC
DOC
DOC
Ex
r Ac
ces
s
fil
to
Att
a
ck
er
Backdoor Trojan
DOC
DOC
DOC
Decoy Document
DOC
DOC
DOC
Figure 3 +Example of malware attack that drops keylogger
Reusing Stolen Passwords or Shared Credentials
For those who lack the time for or interest in stealing credentials on their own,
there’s a booming business buying and selling them online. Attackers don’t just steal
credentials to use for themselves anymore; they steal them to sell that access to
others. Credentials are priced by their potential profitability in underground forums
and are often sold in bulk as shown in our recent Unit 42 report on underground
markets. In addition, it’s becoming more and more common for some hackers to
simply post stolen credentials to the internet for anyone to use.
The chief reason credentials have any monetary value is that most people rarely
change them and often reuse passwords across multiple accounts. That means
these credentials can remain valid for months or years. As shown in Figure 4, when a
shared password is stolen from one set of credentials, it can easily be used in attacks
against other credentials.
Compromised Server
Credentials
joe: abc123
sue: password1
bob: MyP0n3y
Stolen Credentials
joe: abc123
sue: password1
bob: MyP0n3y
sue: password1
joe: abc123
https@//site.com/login
Figure 4 + Stolen credentials from one service used to attack another service
PA L O A LT O N E T W O R K S
+
C R E D E N T I A L - B A S E D AT TA C K S
6
Once attackers acquire credentials, they begin “credential stuffing”: putting as many
credentials as possible into as many sites as possible, to gain access to as many
accounts as possible, as quickly as possible. In some cases, the original thieves will
do this themselves to test the credentials so they can sell them as “known good for
access” for more money.
Another risk with shared credentials is around credentials shared between people. These
days, it’s not unheard of for people to share credentials with others. Whether it’s for
online movie services or shopping, there are some good, practical reasons (like a family
only wanting to pay for one movie subscription account) and bad reasons (such as theft
for illicit access) why credential sharing happens. When people share credentials with
one another, that opens another avenue of potential credential theft. You may be careful
about creating strong, unique passwords that are different for every account, which you
regularly change, following every best practice – but is the person with whom you shared
your account information? Sharing passwords with others can potentially expose your
credentials to a weaker link that ultimately puts everyone at risk.
Brute Force
As noted before, the number of passwords people need to maintain, coupled with
the need (in theory) to change them regularly, together work against password
complexity. Attackers know this and rely on the fact that many people use weak
passwords. Password complexity protects primarily against scenarios where an
attacker can take a stolen hash and subject it to offline, brute-force attacks.
In some cases, the lack of strong passwords is the fault of the organization, when
it doesn’t enforce the use of strong passwords and instead allows accounts to have
weak passwords. In most cases, it’s human error, as people are incapable of creating
truly random, unique passwords even in the best of cases. The problem of weak
passwords is compounded by the fact that, as computers exponentially increase in
power, they can crack passwords that were previously considered strong.
There are software programs to both help create and store strong, unique
passwords, which have gone far in securing accounts for those who use them. But
they aren’t perfect and can be prime targets for hackers; one of these programs,
LastPass, was itself hacked in 2015, with user account information stolen.
Security Question Reuse
While security questions aren’t part of credentials, usernames and passwords, per
se, they form a critical piece of the credential security – and theft – puzzle. Security
questions have settled in, becoming a layer of authentication in addition to, or instead
of, passwords. They are another form of “what you know” authentication. In this case,
the questions are typically centered around information that (in theory) only the actual
persons themselves would know.
Security questions are a nearly ubiquitous feature of account recovery capabilities. If
you’ve ever lost or forgotten a username or, especially, a password, odds are you’ve
had to answer a security question to reset or recover your username and/or password.
PA L O A LT O N E T W O R K S
+
C R E D E N T I A L - B A S E D AT TA C K S
7
Increasingly, though, security questions are being used as a second layer of
authentication. Financial services sites, in particular, are making increasingly regular
use of security questions as an extra layer of security after the password. In this
latter capacity, security questions can be considered an extended part of credentials.
Unfortunately, security questions are a weak second factor of authentication.
First, it’s the same category of authentication factor as passwords: something you
know (as opposed to something you have, like a one-time-password fob; or someone
you are, like a biometric factor).
Second, security questions tend to ask questions whose answers attackers can
gather from online research, especially in an era of social media. Typical security
questions are predictable and their answers, easy to research: a parent’s maiden
name, your first school mascot, where you met your spouse, or your children’s
birthdays. All of these can be collected online or “brute forced.” While security
questions do offer an extra layer of protection, it is an ephemeral one.
Because security questions are designed to be easy things for people to remember,
it also tends to make them static, like school mascots or attendance dates, and
noteworthy events or people in a person’s life, making them even more likely to be
documented online. Family trees on public genealogy sites and public social media
profiles are treasure troves for attackers, and so are searchable public records.
Because the same questions are used across most sites, attackers only need to
compromise this data once, like many passwords. The added enrichment affords
entrance to more accounts and opens the door to identity theft.
Security questions also suffer from another problem: they’re now getting caught up
in credential theft within data breaches. One of the most notable things in Yahoo’s
disclosure in the fall of 2016 of a data breach affecting over 1 billion accounts is
that, in addition to obtaining usernames and passwords, the attackers also obtained
unencrypted answers to security questions. Since security questions tend to be the
same ones across sites, and the answers are supposed to be facts, compromised
answers to security questions are essentially permanently compromised. The only
real recourse in this case is to decide on a fake answer for a commonly used, and
compromised, security question, like deciding on a new, fictitious answer for the
question “where were you born.” But this is only a partial solution because these
questions and answers can later become compromised as well. Unless someone is
willing to try and move to unique security questions and answers per site, there will
always be inherent weaknesses with this method.
What Attackers Do With Stolen Credentials
So far we’ve focused on how attackers steal credentials, but we haven’t talked much
about what they do with them, other than sell them. But what do the people who
buy stolen credentials, or attackers who steal them for their own use, do with them?
Credentials are the digital keys to the kingdom, allowing attackers to masquerade as
legitimate users and aiding the illicit users in hiding their identity. The stolen credentials
PA L O A LT O N E T W O R K S
+
C R E D E N T I A L - B A S E D AT TA C K S
8
grant attackers the power to do everything and access everything the legitimate user
can. The most obvious use for stolen credentials is for profit, whether to profit from
the sale of the stolen credentials or to steal money from a bank, PayPal, bitcoin, online
trading, or any other account holding funds. But credentials are also important for
other attacker goals, especially espionage and causing damage to networks. Some
ransomware attackers, such as those behind SamSa, also rely on stolen credentials to
gain access, move laterally, and then encrypt only the most valuable data to which they
have access. But there are other ways attackers use stolen credentials, including:
•Remote Access – Attackers can use stolen credentials to gain remote
entry into networks using Virtual Private Networks (VPN) and Remote Access
Protocols, like RDP and VNC.
•Lateral Movement – Stolen credentials (especially domain admin
credentials) are a massive benefit to attackers who need deeper penetration
into a network.
•Cloud Access – Cloud services are often defended only by user credentials,
and the data inside them is invaluable, especially as organizations move more
and more information off-premises and into the cloud.
Remote Access
An ever-increasing number of workers can access work networks, email and other
resources while not physically in a corporate office. Letting employees always work
from wherever they are, whenever they want, has opened up a world of opportunity
for attackers. When credentials are stolen, the same flexibility that gives workers
access from anywhere is given to attackers. Stolen remote access credentials also
render null and void any physical controls and countermeasures you may have in
place to protect your network and resources at the perimeter.
Beyond the risk posed by stolen remote access credentials is the fact that cloudbased remote access service providers can themselves become the victim of a data
breach where remote access credentials are stolen. In 2016, TeamViewer and Citrix’s
GoToMyPC, both popular options for remote computer access, had an undisclosed
number of accounts successfully attacked using credentials stolen elsewhere.
Regardless of how attackers gain remote access credentials, once they have them,
they have access to everything the actual account owner does, and will try to gain
higher privileges and move to additional systems, servers, or networks, spreading
malware and stealing credentials as they go.
Lateral Movement
Lateral movement is a key stage that differentiates a more sophisticated data breach
or network compromise from a simple malware attack. For more advanced attacks,
attackers almost never get access to the desired system or systems on the first try.
Once in a network, however, attackers will spread to as many systems as they can
with a prime goal of acquiring administrative-level credentials. In addition to gaining
administrative credentials, they also move laterally to learn more about the network
PA L O A LT O N E T W O R K S
+
C R E D E N T I A L - B A S E D AT TA C K S
9
and its resources, and find ways to solidify their presence in the network to be able
to successfully fend off attempts by defenders to eject them from it.
Administrative credentials have permission not only to access more systems but also
alter those systems. Administrative credentials give full control to attackers and enable
them to “own” systems and networks. It’s important to note that having or obtaining
the right credentials will decide an attacker’s success at this point. Once inside a
network, the only way to spread easily and quietly within it is with the right credentials.
This is where attackers will employ a tool designed to collect all passwords stored
within from the current system – often Mimikatz, pwdump, or a similar tool. By using
tools like these to steal administrative credentials, attackers can “upgrade” from more
limited privilege user accounts to administrative privilege accounts.
Cloud Access
The use of cloud services has exploded over the past few years, both for corporate and
personal use. Unfortunately, the ability to secure data in the cloud has not kept pace
with its use. While organizations may have robust policies and technologies protecting
credentials internally, their cloud accounts may be defended solely by simple username
and password credentials. This is in spite of the fact that the data in the cloud may be
as valuable (if not more so) as data stores on internally protected systems.
The risks around cloud access are similar to those posed by remote access. Just
like with remote access used to log in virtually to an organization, no one physically
confirms the people entering the credentials for cloud access are who they say they
are. But where remote access may only give an attacker access to the network and
not the data stores on it, cloud access can give an attacker access directly to the
data itself. In this way, cloud access can be more serious than remote access. This is
why everyone should at least enact two-factor authentication (discussed later in this
paper) on every account that provides access to sensitive data.
Recommendations
Ultimately, the point of understanding how credential theft can happen and what
attackers can do with stolen credentials is to enable the prevention of credential
theft. If credential theft is the oxygen of attacks, then preventing credential theft can
cut off the oxygen for attacks and prevent them.
Effective prevention of credential theft can and should focus on three major areas:
1. Two-Factor/Multi-Factor Authentication (2FA/MFA) and One-Time
Passwords (OTP)
2. Password Managers
3. User Education
The shift toward both two-factor authentication (2FA)/multi-factor authentication
(MFA) and one-time passwords (OTP) is potentially game-changing for the use
of stolen credentials by altering the nature of credentials from the simple, static
username/password combination into something more difficult to attack.
PA L O A LT O N E T W O R K S
+
C R E D E N T I A L - B A S E D AT TA C K S
10
Two-factor authentication is currently the most widely adopted, with many sites,
vendors and solutions offering it. When activated, a user must supply both the
account username and password, and one of the following:
•Something you know, such as a personal identification number (PIN).
•Something you have, such as a mobile device, certificate or OTP token.
•Something you are, such as a biometric identifier like a fingerprint.
The power of 2FA/MFA’s effectiveness lies in the fact that it accepts and mitigates
the current reality: that passwords are weak or stolen. 2FA/MFA introduce additional
authentication requirements so that an attacker who has only one of the authentication
factors has no more access than the attacker with none of the authentication factors.
An OTP is a password that is valid for only one login or transaction, and most of
them are valid for a limited amount of time before they are replaced by a new one
as well. Because of this, OTPs avoid most weaknesses associated with traditional
passwords. Many of the implementations also incorporate two-factor authentication
by ensuring that the OTP also requires access to something a person has (such
as a small digital token with an OTP calculator built in, or specific mobile device,
or an OTP generator) as well as something a person knows (such as a PIN). This
frees people from the need to create, memorize and manage multiple complicated
passwords, and removes one of the most abused vectors in hacking. This approach
has the possibility to end the reuse of stolen credentials.
While password managers aren’t game-changing, they do represent a realistic and
practical way to mitigate the complexity of today’s password regimen. Password
managers make it practical for users to have unique, strong passwords like they
should. The best password managers manage the complexity for the user by
generating and storing unique, strong passwords on a per-site basis. Generally, a user
need only remember one set of master credentials for the password manager itself
and that, in turn, unlocks the user’s “vault” of stored, unique, complex passwords.
Of course, because password managers store all of a user’s passwords behind
a single set of credentials, they are also targets for precisely this reason. This
means that users need to exercise exceptional caution and vigilance to protect
their password manager credentials. The loss of password manager credentials can
essentially represent a total loss of all of a user’s passwords stored in their vault.
User education to train people to recognize phishing, or at least “fail safe” and not take
potentially dangerous actions (like clicking on links) when in doubt, is another valuable
approach when used in tandem with others. Ensuring users are familiar with what
phishing looks like, and which data points can help decide whether an email is legitimate,
significantly cuts into phishing’s success. As we mentioned in the “Credential Phishing”
section, it is also important that users never store their login credentials or other personal
data in their web browser or anything other than a password manager. Anytime you
receive a request to save credentials, credit cards, name and address, or any personal
data from a web browser, always click “no.” The ephemeral convenience it affords users
also makes them much more vulnerable to losing their data.
PA L O A LT O N E T W O R K S
+
C R E D E N T I A L - B A S E D AT TA C K S
11
Of course, the most valuable lesson in user education is to treat any and all requests
for credentials as inherently suspicious and default to not providing credentials unless
and until the requestor has proven the request is legitimate.
While user education is often looked at as putting the burden of security on the user,
rather than on the technology, the fact is that the user represents the final, most
effective and potentially advanced layer of security there is.
Conclusion
Credential theft is a critical element for successful attacks, arguably the most-critical
element. Consider a possible counterfactual: if the credentials that were involved in
the two-thirds of successful attacks the 2014 Verizon DBIR outlined hadn’t been stolen,
how many of those attacks still would have succeeded? We can never know for sure,
but reasonable supposition says only a fraction of them, if any.
Credential theft is a threat like any other. And like any other threat, it can be mitigated
and oftentimes prevented.
Like all threats, the path to effective mitigation and prevention starts by understanding
the threat landscape: what credential theft is, how it happens, and what attackers do
with credentials once they’ve stolen them.
With this understanding, you can then look at recommendations on how to meet
that threat: in this case, two-factor/multifactor authentication (2FA/MFA), one-time
passwords, password managers and user education.
While password managers are a good Band-Aid for the current situation, and user
education is a constant need and best practice in security, the real progress in
preventing credential theft will be made, and is being made, in the areas of 2FA/MFA.
These fundamentally change the threat landscape in a way that enables defenders to
gain the upper hand once again and successfully prevent credential theft.
We don’t have to treat credential theft as the unknown, inevitable X-factor in successful
attacks. Just as we can fight against threats like attacks against vulnerabilities, spam
and phishing, we can fight against and prevent credential theft.
4401 Great America Parkway
Santa Clara, CA 95054
Main:+1.408.753.4000
Sales:
+1.866.320.4788 Support:+1.866.898.9087
www.paloaltonetworks.com
© 2017 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark
of Palo Alto Networks. A list of our trademarks can be found at http://www.
paloaltonetworks.com/company/trademarks.html. All other marks mentioned
herein may be trademarks of their respective companies. Palo Alto Networks
assumes no responsibility for any inaccuracies in this document or for any
obligation to update information in this document. Palo Alto Networks
reserves the right to change, modify, transfer, or otherwise revise this publication
without notice. credential-based-theft-032717