Compromised Credentials

7th December 2019 | Cybrary Compromised Credentials

Compromised Credentials occurs when an unsuspecting user’s login username and password are in the possession of a hacker. Those credentials have been compromised. How they are compromised can occur in many different ways. Two of the most common are breached online websites as shown in the graphic above (Yahoo, Myspace, and DropBox being examples of large-scale breaches).

Another way is the result of a successful phishing campaign in which employees attempt to open a document or file sent by a colleague or business partner and it immediately requests your Google or Microsoft credentials. What is really happening is you are at a Hacker Website which will steal your Email Account credentials if you enter them.

The results can be devastating. Hackers know that once they get into one employees email account, they can send another phishing attack to steal other people’s credentials to ALL the EMAIL addresses in that compromised email account. This is what makes these attacks so devastating, quick, and effective. For more information on a real-world event, read the Blog article titled: Domino Attack.

Learn how to protect yourself with this CyberHoot Authoried Free video:

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

DocuSign has become one of the most trusted tools in modern business. Contracts, HR paperwork, NDAs, vendor...

Read more
PromptSpy: The Android Malware That Hired an AI Assistant

PromptSpy: The Android Malware That Hired an AI Assistant

And yes, Google's Gemini AI had no idea it was working for the bad guys. Malware has always followed a script....

Read more
Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...

Read more