×

Information security apparatus and methods for credential dump authenticity verification

  • US 10,574,658 B2
  • Filed: 11/14/2017
  • Issued: 02/25/2020
  • Est. Priority Date: 02/09/2016
  • Status: Active Grant
First Claim
Patent Images

1. An apparatus, comprising:

  • a memory storing processor-executable instructions, a plurality of blacklist terms previously-identified as included in an inauthentic credential dump, and a plurality of credential dump records, each credential dump record from the plurality of credential dump records including an associated plurality of hashes; and

    at least one processor, operably coupled to the memory and configured to execute the processor-executable instructions to;

    receive repository data from a plurality of targeted remote repositories;

    determine the repository data omits each blacklist term from the plurality of blacklist terms;

    in response to the determination that the repository data omits each blacklist term from the plurality of blacklist terms;

    detect a common format and a common delimiter of the repository data;

    identify a plurality of pairs of usernames and associated passwords of the repository data based on the common format and the common delimiter;

    generate a hash for each pair of usernames and associated passwords from the plurality of pairs of usernames and associated passwords to produce a plurality of hashes;

    compare the plurality of hashes to the plurality of hashes associated with the plurality of credential dump records stored in the memory to determine a percentage of the plurality of hashes that are not associated with the plurality of credential dump records;

    identify the repository data as an authentic credential dump in response to the determination that the percentage is larger than a predetermined threshold; and

    send a signal identifying an intrusion into a computer system associated with the repository data after the repository data is identified as an authentic credential clump; and

    wherein the repository data is received from a first targeted remote repository of the plurality of targeted remote repositories, periodically, at a first rate that is a function of the first targeted remote repository, and the repository data is received from a second targeted remote repository of the plurality of targeted remote repositories, periodically, at a second rate that is a function of the second targeted remote repository.

View all claims
  • 13 Assignments
Timeline View
Assignment View
    ×
    ×