×

Information security apparatus and methods for credential dump authenticity verification

  • US 9,871,797 B2
  • Filed: 02/09/2016
  • Issued: 01/16/2018
  • Est. Priority Date: 02/09/2016
  • Status: Active Grant
First Claim
Patent Images

1. An apparatus, comprising:

  • a memory storing processor-executable instructions, a plurality of blacklist terms associated with an instruction to ignore data, and a plurality of credential dump records, each credential dump record from the plurality of credential dump records including an associated plurality of hashes; and

    at least one processor, operably coupled to the memory and configured to execute the processor-executable instructions to;

    receive repository data from a plurality of targeted remote repositories;

    in response to a determination that a credential dump attribute is identified in the repository data;

    access each blacklist term from the plurality of blacklist terms that are previously-identified and stored;

    determine whether a blacklist term from the plurality of blacklist terms is identified in the repository data; and

    in response to a determination that a blacklist term from the plurality of blacklist terms is not identified in the repository data;

    detect a common format and a common delimiter of the repository data;

    identify a plurality of pairs of usernames and associated passwords of the repository data based on the common format and the common delimiter;

    generate a hash for each pair of usernames and associated passwords from the plurality of pairs of usernames and associated passwords to produce a plurality of hashes;

    compare the plurality of hashes to the plurality of credential dump records stored in the memory;

    determine a percentage of the plurality of hashes that are not associated with the plurality of credential dump records;

    send a signal indicating that the repository data is an authentic credential dump in response to the determination that the percentage is larger than a predetermined threshold;

    identify an intrusion into a computer system associated with the repository data in response to the determination that the percentage is larger than the predetermined threshold; and

    the credential dump attribute including at least one of;

    the repository data including more than a predetermined number of usernames and the repository data including a password-type field.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×