cyberint.com Open in urlscan Pro
141.193.213.11  Public Scan

URL: https://cyberint.com/blog/thought-leadership/compromised-credentials-tactics-risks-mitigation/
Submission: On October 22 via api from DE — Scanned from DE

Form analysis 2 forms found in the DOM

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2034462/230c9049-7f32-4103-afb0-7c165de6f8f1

<form id="hsForm_230c9049-7f32-4103-afb0-7c165de6f8f1" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2034462/230c9049-7f32-4103-afb0-7c165de6f8f1"
  class="hs-form-private hsForm_230c9049-7f32-4103-afb0-7c165de6f8f1 hs-form-230c9049-7f32-4103-afb0-7c165de6f8f1 hs-form-230c9049-7f32-4103-afb0-7c165de6f8f1_87563672-fe9b-44c4-9264-3b91addc00b4 hs-form stacked"
  target="target_iframe_230c9049-7f32-4103-afb0-7c165de6f8f1" data-instance-id="87563672-fe9b-44c4-9264-3b91addc00b4" data-form-id="230c9049-7f32-4103-afb0-7c165de6f8f1" data-portal-id="2034462"
  data-test-id="hsForm_230c9049-7f32-4103-afb0-7c165de6f8f1" data-hs-cf-bound="true">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-230c9049-7f32-4103-afb0-7c165de6f8f1" class="" placeholder="Enter your " for="email-230c9049-7f32-4103-afb0-7c165de6f8f1"><span></span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-230c9049-7f32-4103-afb0-7c165de6f8f1" name="email" required="" placeholder="Your email here*" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="legal-consent-container">
    <div class="hs-richtext">
      <p>I agree to Cyberint's <a href="https://cyberint.com/terms-conditions/" target="_blank" rel="noopener">Terms of Use</a> and <a href="https://cyberint.com/privacy-policy/" target="_blank" rel="noopener">Privacy Policy</a></p>
    </div>
    <div>
      <div class="hs-dependent-field">
        <div class="hs_LEGAL_CONSENT.subscription_type_944128 hs-LEGAL_CONSENT.subscription_type_944128 hs-fieldtype-booleancheckbox field hs-form-field">
          <legend class="hs-field-desc" style="display: none;"></legend>
          <div class="input">
            <ul class="inputs-list" required="">
              <li class="hs-form-booleancheckbox"><label for="LEGAL_CONSENT.subscription_type_944128-230c9049-7f32-4103-afb0-7c165de6f8f1" class="hs-form-booleancheckbox-display"><input
                    id="LEGAL_CONSENT.subscription_type_944128-230c9049-7f32-4103-afb0-7c165de6f8f1" class="hs-input" type="checkbox" name="LEGAL_CONSENT.subscription_type_944128" value="true"><span>
                    <p>I agree to subscribe to receive updates&nbsp; from Cyberint</p><span class="hs-form-required">*</span>
                  </span></label></li>
            </ul>
          </div>
        </div>
      </div>
      <legend class="hs-field-desc checkbox-desc" style="display: none;"></legend>
    </div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="Subscribe "></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1729582964211&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1679496836482&quot;,&quot;legalConsentOptions&quot;:&quot;{\&quot;legitimateInterestSubscriptionTypes\&quot;:[944128],\&quot;communicationConsentCheckboxes\&quot;:[{\&quot;communicationTypeId\&quot;:944128,\&quot;label\&quot;:\&quot;<p>I agree to subscribe to receive updates&amp;nbsp; from Cyberint</p>\&quot;,\&quot;required\&quot;:true}],\&quot;legitimateInterestLegalBasis\&quot;:\&quot;LEGITIMATE_INTEREST_PQL\&quot;,\&quot;communicationConsentText\&quot;:\&quot;<p>I agree to Cyberint's <a href=\\\&quot;https://cyberint.com/terms-conditions/\\\&quot; target=\\\&quot;_blank\\\&quot; rel=\\\&quot;noopener\\\&quot;>Terms of Use</a> and <a href=\\\&quot;https://cyberint.com/privacy-policy/\\\&quot; target=\\\&quot;_blank\\\&quot; rel=\\\&quot;noopener\\\&quot;>Privacy Policy</a></p>\&quot;,\&quot;processingConsentType\&quot;:\&quot;IMPLICIT\&quot;,\&quot;processingConsentCheckboxLabel\&quot;:\&quot;<p>I agree</p>\&quot;,\&quot;isLegitimateInterest\&quot;:false}&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;Compromised Credentials: Tactics, Risks, Mitigation&quot;,&quot;pageUrl&quot;:&quot;https://cyberint.com/blog/thought-leadership/compromised-credentials-tactics-risks-mitigation/&quot;,&quot;isHubSpotCmsGeneratedPage&quot;:false,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;hutk&quot;:&quot;52e41171bb9322e1fb4ef89a7319b38e&quot;,&quot;__hsfp&quot;:90950173,&quot;__hssc&quot;:&quot;206209484.1.1729582965708&quot;,&quot;__hstc&quot;:&quot;206209484.52e41171bb9322e1fb4ef89a7319b38e.1729582965708.1729582965708.1729582965708.1&quot;,&quot;formTarget&quot;:&quot;#hbspt-form-87563672-fe9b-44c4-9264-3b91addc00b4&quot;,&quot;boolCheckBoxFields&quot;:&quot;LEGAL_CONSENT.subscription_type_944128&quot;,&quot;rumScriptExecuteTime&quot;:312.3999996185303,&quot;rumTotalRequestTime&quot;:616.8999996185303,&quot;rumTotalRenderTime&quot;:639.6999998092651,&quot;rumServiceResponseTime&quot;:304.5,&quot;rumFormRenderTime&quot;:22.800000190734863,&quot;connectionType&quot;:&quot;4g&quot;,&quot;firstContentfulPaint&quot;:0,&quot;largestContentfulPaint&quot;:0,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1729582965715,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;2034462&quot;,&quot;formId&quot;:&quot;230c9049-7f32-4103-afb0-7c165de6f8f1&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hbspt-form-87563672-fe9b-44c4-9264-3b91addc00b4&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;isMobileResponsive&quot;:true},&quot;correlationId&quot;:&quot;87563672-fe9b-44c4-9264-3b91addc00b4&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;,&quot;LEGAL_CONSENT.subscription_type_944128&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.6227&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.6227&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;6227&quot;,&quot;allPageIds&quot;:{},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1729582964354,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;Compromised Credentials: Tactics, Risks, Mitigation\&quot;,\&quot;pageUrl\&quot;:\&quot;https://cyberint.com/blog/thought-leadership/compromised-credentials-tactics-risks-mitigation/\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36\&quot;,\&quot;isHubSpotCmsGeneratedPage\&quot;:false}&quot;},{&quot;clientTimestamp&quot;:1729582964355,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;DE\&quot;&quot;},{&quot;clientTimestamp&quot;:1729582965712,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;52e41171bb9322e1fb4ef89a7319b38e\&quot;,\&quot;contentType\&quot;:\&quot;blog-post\&quot;}&quot;}]}"><iframe
    name="target_iframe_230c9049-7f32-4103-afb0-7c165de6f8f1" style="display: none;"></iframe>
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2034462/58cec4e1-ef41-4080-8291-8ed3508d64be

<form id="hsForm_58cec4e1-ef41-4080-8291-8ed3508d64be_hs-form67171a341b56a" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2034462/58cec4e1-ef41-4080-8291-8ed3508d64be"
  class="hs-form-private hsForm_58cec4e1-ef41-4080-8291-8ed3508d64be hs-form-58cec4e1-ef41-4080-8291-8ed3508d64be hs-form-58cec4e1-ef41-4080-8291-8ed3508d64be_2bdba0e7-7af6-453b-940f-3251939f5737 hs-form stacked hs-custom-style"
  target="target_iframe_58cec4e1-ef41-4080-8291-8ed3508d64be_hs-form67171a341b56a" data-instance-id="2bdba0e7-7af6-453b-940f-3251939f5737" data-form-id="58cec4e1-ef41-4080-8291-8ed3508d64be" data-portal-id="2034462"
  data-test-id="hsForm_58cec4e1-ef41-4080-8291-8ed3508d64be_hs-form67171a341b56a" data-hs-cf-bound="true">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-58cec4e1-ef41-4080-8291-8ed3508d64be_hs-form67171a341b56a" class="" placeholder="Enter your Email"
      for="email-58cec4e1-ef41-4080-8291-8ed3508d64be_hs-form67171a341b56a"><span>Email</span><span class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-58cec4e1-ef41-4080-8291-8ed3508d64be_hs-form67171a341b56a" name="email" required="" placeholder="Your email here" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="legal-consent-container">
    <div class="hs-richtext">
      <p>I agree to Cyberint's <a href="https://cyberint.com/terms-conditions/" target="_blank" rel="noopener">Terms of Use</a> and <a href="https://cyberint.com/privacy-policy/" target="_blank" rel="noopener">Privacy Statement</a></p>
    </div>
    <div>
      <div class="hs-dependent-field">
        <div class="hs_LEGAL_CONSENT.subscription_type_944128 hs-LEGAL_CONSENT.subscription_type_944128 hs-fieldtype-booleancheckbox field hs-form-field">
          <legend class="hs-field-desc" style="display: none;"></legend>
          <div class="input">
            <ul class="inputs-list" required="">
              <li class="hs-form-booleancheckbox"><label for="LEGAL_CONSENT.subscription_type_944128-58cec4e1-ef41-4080-8291-8ed3508d64be_hs-form67171a341b56a" class="hs-form-booleancheckbox-display"><input
                    id="LEGAL_CONSENT.subscription_type_944128-58cec4e1-ef41-4080-8291-8ed3508d64be_hs-form67171a341b56a" class="hs-input" type="checkbox" name="LEGAL_CONSENT.subscription_type_944128" value="true"><span>
                    <p>I hereby agree to subscribe to received news, updates and offers from Cyberint. </p><span class="hs-form-required">*</span>
                  </span></label></li>
            </ul>
          </div>
        </div>
      </div>
      <legend class="hs-field-desc checkbox-desc" style="display: none;"></legend>
    </div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="See for Yourself"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1729582964674&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1705474243150&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;legalConsentOptions&quot;:&quot;{\&quot;communicationConsentCheckboxes\&quot;:[{\&quot;communicationTypeId\&quot;:944128,\&quot;label\&quot;:\&quot;<p>I hereby agree to subscribe to received news, updates and offers from Cyberint. </p>\&quot;,\&quot;required\&quot;:true}],\&quot;legitimateInterestLegalBasis\&quot;:\&quot;LEGITIMATE_INTEREST_PQL\&quot;,\&quot;communicationConsentText\&quot;:\&quot;<p>I agree to Cyberint's <a href=\\\&quot;https://cyberint.com/terms-conditions/\\\&quot; target=\\\&quot;_blank\\\&quot; rel=\\\&quot;noopener\\\&quot;>Terms of Use</a> and <a href=\\\&quot;https://cyberint.com/privacy-policy/\\\&quot; target=\\\&quot;_blank\\\&quot; rel=\\\&quot;noopener\\\&quot;>Privacy Statement</a></p>\&quot;,\&quot;processingConsentType\&quot;:\&quot;IMPLICIT\&quot;,\&quot;processingConsentCheckboxLabel\&quot;:\&quot;<p>I agree</p>\&quot;,\&quot;isLegitimateInterest\&quot;:false}&quot;,&quot;embedType&quot;:&quot;REGULAR&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;Compromised Credentials: Tactics, Risks, Mitigation&quot;,&quot;pageUrl&quot;:&quot;https://cyberint.com/blog/thought-leadership/compromised-credentials-tactics-risks-mitigation/&quot;,&quot;isHubSpotCmsGeneratedPage&quot;:false,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;hutk&quot;:&quot;52e41171bb9322e1fb4ef89a7319b38e&quot;,&quot;__hsfp&quot;:90950173,&quot;__hssc&quot;:&quot;206209484.1.1729582965708&quot;,&quot;__hstc&quot;:&quot;206209484.52e41171bb9322e1fb4ef89a7319b38e.1729582965708.1729582965708.1729582965708.1&quot;,&quot;formTarget&quot;:&quot;#hs-form67171a341b56a&quot;,&quot;formInstanceId&quot;:&quot;hs-form67171a341b56a&quot;,&quot;boolCheckBoxFields&quot;:&quot;LEGAL_CONSENT.subscription_type_944128&quot;,&quot;rumScriptExecuteTime&quot;:824.1000003814697,&quot;rumTotalRequestTime&quot;:1004.8999996185303,&quot;rumTotalRenderTime&quot;:1026.5,&quot;rumServiceResponseTime&quot;:180.79999923706055,&quot;rumFormRenderTime&quot;:21.600000381469727,&quot;connectionType&quot;:&quot;4g&quot;,&quot;firstContentfulPaint&quot;:0,&quot;largestContentfulPaint&quot;:0,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1729582965719,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;2034462&quot;,&quot;formId&quot;:&quot;58cec4e1-ef41-4080-8291-8ed3508d64be&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hs-form67171a341b56a&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;formInstanceId&quot;:&quot;hs-form67171a341b56a&quot;,&quot;css&quot;:&quot;&quot;,&quot;cssRequired&quot;:&quot;&quot;,&quot;isMobileResponsive&quot;:true},&quot;correlationId&quot;:&quot;2bdba0e7-7af6-453b-940f-3251939f5737&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;,&quot;LEGAL_CONSENT.subscription_type_944128&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.6227&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.6227&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;6227&quot;,&quot;allPageIds&quot;:{},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1729582964742,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved customer callbacks used on embed context: [\&quot;onFormReady\&quot;,\&quot;onFormSubmit\&quot;,\&quot;onFormSubmitted\&quot;]&quot;},{&quot;clientTimestamp&quot;:1729582964742,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;Compromised Credentials: Tactics, Risks, Mitigation\&quot;,\&quot;pageUrl\&quot;:\&quot;https://cyberint.com/blog/thought-leadership/compromised-credentials-tactics-risks-mitigation/\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36\&quot;,\&quot;isHubSpotCmsGeneratedPage\&quot;:false}&quot;},{&quot;clientTimestamp&quot;:1729582964743,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;DE\&quot;&quot;},{&quot;clientTimestamp&quot;:1729582965716,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;52e41171bb9322e1fb4ef89a7319b38e\&quot;,\&quot;contentType\&quot;:\&quot;blog-post\&quot;}&quot;}]}"><iframe
    name="target_iframe_58cec4e1-ef41-4080-8291-8ed3508d64be_hs-form67171a341b56a" style="display: none;"></iframe>
</form>

Text Content

 * 

 * Cyberint is now Check Point Software External Risk Management 16.10.2024Data
   Breach at Sorbonne University Exposes Persona...

 * 

  
╳
 * Platform⌄
   * Platform Lobby
   
   * * Attack Surface Management
     * Darkweb Threat Intelligence
     * Supply Chain Intelligence
     * Malware Intelligence
   
   * * Phishing Detection
     * Social Media Monitoring
     * Threat Hunting
   
   * * Vulnerability Intelligence
     * Risk Intelligence Feeds
     * Dashboards and Reports
 * Services⌄
   * Services Lobby
   
   * * Virtual Humint Operations
     * Deep Cyber Investigation
   
   * * Threat Landscape Analysis
     * Deep and Darkweb Monitoring
   
   * * Takedowns & Remediation
     * Attack Simulation
 * Solutions⌄
   
   
   * BY USE CASE
     
     * Phishing
     * Attackware
     * Brand
     * Data Leakage
     * Fraud
   
   
   * BY INDUSTRY
     
     * Financial Services
     * Retail
     * Media & Gaming
     * Healthcare
     * Government Agencies
     * Oil and Gas
   
   
   * BY ROLE
     
     * CISO
     * Security Analyst
     * Marketing
 * Resources⌄
   
   * * Blog
     * Resources
 * Partners⌄
   
   * * Grow with Cyberint
     * MSSP Program
     * Value Added Resellers
     * Technology Partners
     * OEM Partners
     * Become a Partner
     * Partner Login
 * Company⌄
   
   
   * COMPANY
     
     * About Us
     * Careers
     * Events
     * Pricing
   
   * * Ransomania
     * Media Coverage
     * Press Releases
     * News Feed
   
   
   * CONTACT US
     
     * Talk to an Expert
     * Contact Us
     * Customer Support

SupportRequest a Demo
EN
English 日本語 Español Deutsch
Request a Demo
 * Platform⌄
   * Platform Lobby
   
   * * Attack Surface Management
     * Darkweb Threat Intelligence
     * Supply Chain Intelligence
     * Malware Intelligence
   
   * * Phishing Detection
     * Social Media Monitoring
     * Threat Hunting
   
   * * Vulnerability Intelligence
     * Risk Intelligence Feeds
     * Dashboards and Reports
 * Services⌄
   * Services Lobby
   
   * * Virtual Humint Operations
     * Deep Cyber Investigation
   
   * * Threat Landscape Analysis
     * Deep and Darkweb Monitoring
   
   * * Takedowns & Remediation
     * Attack Simulation
 * Solutions⌄
   
   
   * BY USE CASE
     
     * Phishing
     * Attackware
     * Brand
     * Data Leakage
     * Fraud
   
   
   * BY INDUSTRY
     
     * Financial Services
     * Retail
     * Media & Gaming
     * Healthcare
     * Government Agencies
     * Oil and Gas
   
   
   * BY ROLE
     
     * CISO
     * Security Analyst
     * Marketing
 * Resources⌄
   
   * * Blog
     * Resources
 * Partners⌄
   
   * * Grow with Cyberint
     * MSSP Program
     * Value Added Resellers
     * Technology Partners
     * OEM Partners
     * Become a Partner
     * Partner Login
 * Company⌄
   
   
   * COMPANY
     
     * About Us
     * Careers
     * Events
     * Pricing
   
   * * Ransomania
     * Media Coverage
     * Press Releases
     * News Feed
   
   
   * CONTACT US
     
     * Talk to an Expert
     * Contact Us
     * Customer Support

Support
EN
English 日本語 Español Deutsch
Compromised Credentials: Tactics, Risks, Mitigation

 * Table of contents
 * Uses of Compromised Credentials
 * Compromised Credentials Tactics and Techniques
 * What is Credential Stuffing?
 *  What Is An Account Takeover?
 * With Compromised Credentials, Time Is Money
 * The Impact of Exposed Customer Credentials
 * How to Identify a Compromised Customer Account
 * 
 * Recommendations to Prevent Compromised Customer Credentials
 * Immediate Steps to Take When Compromised Customer Credentials Are Found
 * How to Defend Against Compromised Credential Attacks

THE AUTHOR

DARJA FELDMAN



Share on LinkedIn

Dedicated and enthusiastic WEBINT Analyst with four years of experience.
Multilingual with extensive research experience in online risk & fraud
prevention in FinTech.

TABLE OF CONTENTS

 * Uses of Compromised Credentials
 * Compromised Credentials Tactics and Techniques
 * What is Credential Stuffing?
 *  What Is An Account Takeover?
 * With Compromised Credentials, Time Is Money
 * The Impact of Exposed Customer Credentials
 * How to Identify a Compromised Customer Account
 * 
 * Recommendations to Prevent Compromised Customer Credentials
 * Immediate Steps to Take When Compromised Customer Credentials Are Found
 * How to Defend Against Compromised Credential Attacks

RELATED ARTICLES

Thought Leadership


WHY SCAMMERS LOVE THE HOLIDAYS, AND HOW TO STOP HOLIDAY PHISHING RISKS

Cyberint has observed a 46% rise in phishing attacks over the holiday season.
Cyberint detail...
Oct 7, 2024
Learn more
Thought Leadership


SOLVING MSSP CUSTOMER ABANDONMENT CHALLENGES BY CHOOSING THE RIGHT MSSP SOFTWARE

Styled Text "Cutting your prices to match the bargain bin might win you a
sprint,...
Sep 8, 2024
Learn more
Thought Leadership


COMPROMISED CREDENTIALS: TACTICS, RISKS, MITIGATION

May 31, 2023
Share: Share on Twitter Share on LinkedIn

The theft of users’ credentials is a growing industry. The market for
compromised credentials is vast and has huge potential due to:

 * The online availability of cheap malware kits
 * The increase in active theft operations around the world
 * The increasing sophistication of techniques implemented by threat actors

These factors have created a lucrative market for cybercriminals who are able to
steal credentials and sell them on the black market. The stolen credentials can
then be used to access personal and financial information, commit identity
theft, or launch other cyberattacks.

Almost every website and application uses passwords to authenticate users, who
have to deal with an increasing number of online accounts. As the need grows,
users tend to reuse the same account-passwords combinations for many of the
online services they use.

Unfortunately, the widespread use and reuse of passwords makes them attractive
targets for cybercriminals, who know that stolen passwords provide an entry
point to other accounts and services.

Each year, billions of compromised credentials appear online, either on the dark
web, clear web, paste sites or in data dumps shared by cybercriminals. These
credentials are then used by threat actors for account takeover attacks, fraud,
and data theft.

While businesses try to protect their own sensitive information from attacks,
customer information is stored in vulnerable databases all over the web. This
results in identity fraud losses of totaling around $52 billion and affected 42
million U.S. adults in 2022 alone.

The identification of compromised customer accounts, targeted domains, and
vulnerable passwords enables organizations to proactively build a better defense
against account takeovers and fraudulent activities. Furthermore, the constant
identification of customer accounts that have been compromised, provides ongoing
fraud monitoring without impacting the user experience.

Collected data can be used to gain insight into which domains are being targeted
and what the most vulnerable passwords are. This helps to prioritize risk
mitigation strategies and protect the organization’s customers and their own
reputation.


USES OF COMPROMISED CREDENTIALS

An organization’s customers’ credentials are a valuable commodity in the
cybercriminal market for 2 main  reasons:

 1. They are relatively easy and cheap to obtain, requiring little effort from
    novice threat actors to
    get their hands on
 2. The credentials can be developed and abused in a variety of other fraudulent
    activities, such as:

 * Acquiring Additional PIIs and Data – after entering an account, threat actors
   can harvest more information, for example, credit cards, phone numbers,
   addresses, IDs, etc.
 * Spam – a legitimate account is a good tool for scams and other deceitful
   activities.
 * Phishing – under the disguise of a legitimate account, threat actors target
   the account owner’s contacts.
 * Ransom Attacks – owners of valuable accounts might be forced to pay ransom to
   re-access their accounts
 * Financial Fraud – accounts with access to financial data and the ability to
   execute transactions, such as credit cards, withdrawing funds and wiring
   money, are especially valuable to threat actors. Financial Fraud and
   Transaction Laundering can be executed with standard currencies, as well as
   cryptocurrencies, and even loyalty points or gift card credit.
 * Promo Abuse – threat actors rely on multi-accounting techniques to gain as
   many sign-up or
   referral bonuses as possible.
 * Card Testing – some accounts are only used to make small purchases, or to
   test credit cards. This helps threat actors to check the validity of stolen
   credit cards, which can then fuel their criminal buying sprees.
 * Acquiring Access to Premium Accounts – especially popular for services with
   fee/membership-based services, such as Netflix, Spotify, and others Money
   Laundering or Money Mule Transactions
 * Social Media Engagement – compromised accounts are used to run “bot farms”
   for social media engagement manipulation, such as followers and likes.


COMPROMISED CREDENTIALS TACTICS AND TECHNIQUES

The foundation for exposed customer credentials is fraudulent access to a user’s
account credentials.
Below are some tactics how attackers usually compromise legitimate accounts:

 1. Brute-force attacks – The attacker links a username/password combination
    across many accounts until one yields results. These include so-called”
    dictionary attacks,” in which attackers use common passwords and dictionary
    terms to guess passwords.
 2. Credential Stuffing – The attacker utilizes the bad habit where people use
    the same password for multiple accounts. If one of those passwords is leaked
    in an unrelated data breach, any other account with the same username and
    password is at risk.
 3. Dark Markets – Attackers can download cracked passwords from darknet markets
    to attempt ATO on the same user accounts on their target site.
 4. Phishing – remains an effective way to get a victim’s password. Without
    controls such as multifactor authentication (MFA), lost credentials can lead
    to compromised accounts.
 5. Malware Attacks – Keyloggers, stealers, and other varieties of malware can
    expose user credentials, giving attackers control of victims’ accounts.
 6. Security Vulnerabilities Exploitation – unpatched security holes are used to
    gain unauthorized access to a system. For example, Cross-Site Scripting
    (XSS) and Server Side Request Forgery (SSRF).
 7. Social Engineering Attacks – threat actors contact people in person and
    attempt to extract login
    information.


WHAT IS CREDENTIAL STUFFING?

Credential stuffing is a type of cyber attack that involves repeated attempts to
log in to online accounts using usernames and passwords stolen from other online
services. It takes advantage of the fact that people often reuse passwords
across multiple accounts. Threat actors know that usernames and passwords used
on one website may also be used on other websites, and they exploit this
weakness by using automated tools to try these credentials on many different
websites.

Credential stuffing attacks often require little technical knowledge. Threat
actors can use free, easily accessible software that can broadcast hundreds of
simultaneous login attempts without any human intervention. A single threat
actor can easily send hundreds of thousands or even millions of login attempts
to a single web service.

Although most login attempts fail in a credential stuffing attack, due to the
sheer number of attempts, a single attack can still result in thousands of
accounts being compromised. Threat actors have several ways to monetize these
compromised accounts, such as:

 * Using a credit card saved by a customer to make fraudulent purchases.
 * Stealing and selling gift cards that a customer has saved on an account.
 * Using customer details stolen from an account to conduct a phishing attack.
 * Simply selling login credentials to someone else on the dark web.


 WHAT IS AN ACCOUNT TAKEOVER?

An account takeover is an identity attack in which attackers gain unauthorized
access to customers’ legitimate accounts using a variety of attack vectors,
including credential stuffing, phishing, and session hijacking. Once they have
access, they can steal something of value, such as sensitive personal
information, impersonate the account owner, gain access to funds and/or payment
cards, or use the account as an entry point to defraud the owner’s contacts.

Account takeovers are used by threat actors in a variety of ways, including:

 * Stealing sensitive personal information
 * Impersonating the account owner
 * Gaining access to funds and/or payment cards
 * Using the account as an entry point to defraud the owner’s contacts

It is important to note that Account Takeover (ATO) fraud is not limited to bank
and credit card accounts. Attackers can also use reward cards and services,
including points saved on hotel accounts and airline miles. This scam is gaining
traction because targeted users rarely check their reward accounts for scams
compared to credit cards and bank accounts.

ATOs usually start with credential stuffing attacks. Attackers use scripts that
contain potentially thousands of credentials and user accounts to automate these
attacks. Revenue generated from a successful advanced attack can reach millions
on darknet markets.

The emergence of darknet markets has popularized account takeover attacks.
Attackers no longer need to steal directly from targeted users, which reduces
personal liability. On the contrary, attackers looking to steal directly from
users can simply purchase valid accounts on darknet markets without completing
the tedious task of password cracking. The increase in financial accounts and
products has also populated the market. Targeted users often have many financial
accounts spread across multiple websites, making them attractive to threat
actors. More financial accounts and an online presence means an increased attack
surface for ATO fraud.

When attackers choose to sell authenticated accounts, they are expecting a high
payout for their efforts. The value of just one hacked account depends on the
amount of data stolen and the type of account. With potentially thousands of
accounts, an attacker could have a hefty payday selling on darknet markets and
limit detection compared to directly stealing from victims.


WITH COMPROMISED CREDENTIALS, TIME IS MONEY

The fresher the compromised credentials, the higher the chance threat actors can
achieve their financial objective. However, credentials are rarely used by
threat actors in “real-time.” Unless the credential is compromised in highly
targeted attacks, threat actors require time to analyze the reams of data that
they have captured. This process of filtration and extraction enables them to
pull out ‘prime’ credentials either to sell on illegal marketplaces or use them
for further exploitation. However, the sooner the compromised credentials are
detected, the faster security teams can remediate them.
If stolen credential information can be detected very early on, no more than a
few days after they have been compromised, the impact of the theft on the
business can be massively reduced.


THE IMPACT OF EXPOSED CUSTOMER CREDENTIALS

Exposed customer credentials may not seem like one of a CISO’s responsibilities,
as long as they are not the result of an internal breach. However, they can be
very damaging, not only to the business’s brand reputation, but also have
financial and even legal implications. Furthermore, it should be kept in mind
that users will most likely blame the business for any damage that occurs
through exposed credentials and account takeovers, blaming it on the company’s
lack of security and fraud-prevention measures.


WHAT ARE THE FINANCIAL IMPLICATIONS OF EXPOSED CUSTOMER CREDENTIALS?

 * Increased Transaction Disputes
 * Increased Chargebacks
 * High Customer Churn
 * Revenue Loss
 * Eventually Financial Penalties/Fines
 * Chargebacks are expensive for e-commerce websites, especially those using
   third-party payment gateways. High chargeback rates can lead to increased
   transaction fees, which can result in significant losses. Therefore, credit
   card chargeback prevention is essential for any business.


WHAT ARE THE REPUTATIONAL IMPLICATIONS OF EXPOSED CUSTOMER CREDENTIALS?

 * Customer Churn
 * Financial Penalties/fines
 * Reputational Loss with Financial Institutions
 * Brand and reputation may suffer, as the company may find itself unfairly
   accused of a data breach,
   which might lead to negative publicity, fines, and lost business.
   Furthermore, loss of customers and
   future revenues may occur, as customers whose accounts are taken over lose
   trust in the brand and
   walk away, creating bad publicity for the company.


HOW TO IDENTIFY A COMPROMISED CUSTOMER ACCOUNT

Attacks resulting in exposed customer credentials are often identified by
companies after a customer files a claim or complaint. Proper bot and online
fraud protection should be the minimum that a business implements on their
online assets in order to detect this kind of attack and prevent the exposure of
customer credentials and account takeovers. Below are some important signs to
detect attack takeovers on the business’s websites:

 * IP Addresses from unusual geographic locations – a sudden rise of IP
   addresses from one or
   more countries outside the usual access locations can be a good indicator of
   attacks using
   exposed customer credentials. Particular attention should be directed at
   changes in the access
   location for users with recent account changes.
 * Multiple Accounts Share the Same Details – when similar changes to PIIs
   (email, delivery address,
   etc.) are applied across more than one account, it might be a sign of an
   account takeover attack.
 * Unknown/Obfuscated Device Models – a higher-than-usual ratio of unknown
   devices, is a
   warning sign.
 * Multiple Accounts accessed by the Same Device or IP – often attackers do not
   spoof or mask
   their device between logging into different accounts, meaning that if they
   steal and access more
   than one account, they will all be linked to one device. However, this
   indicator should not be
   considered stand-alone proof, taking into account cases when devices are
   legitimately shared by
   multiple users.
 * Detection of Suspicious VPN Proxies or TOR Usage – or any other use of
   emulators and virtual
   machines
 * Unusual Number of Chargeback Requests
 * Mass Login Attempts on one Account
 * Mass Password Reset Requests
 * Unusually Large Purchases OR Large Transfers

Check to See if you have Compromised Credentials


RECOMMENDATIONS TO PREVENT COMPROMISED CUSTOMER CREDENTIALS

Compromised Customer credentials are so prevalent that most businesses cannot
avoid them. Therefore, any company that maintains online accounts for its
customers should have a data security plan that includes strong safeguards to
protect customers.

Furthermore, account takeovers involving compromised customer credentials are
difficult to detect because they rely on social engineering techniques: threat
actors may impersonate the victim or use other methods to trick the account
holder into giving them their login information. Account owners often do not
realize that their account has been compromised until it’s too late.

Like with everything else, organizations should look to a holistic approach when
it comes to their cyber-defense, as there is no single measure or technology
that can achieve total coverage. Even the Multifactor Authentication can be
bypassed.

Smart Password Use is essential – password reuse should be avoided at all costs,
and a strong
password policy should be in place to reduce the risk of easy-to-guess
passwords. Multifactor Authentication (MFA) should be set up as a threat actor
is less likely to have access to more than one factor of the authentication
process. More information about this topic can be found in Cyberint’s report
“Cookie O’clock.”

It is highly recommended to put in place different complementary solutions to
minimize both risk and impact. Companies should also consider how strong their
defense mechanisms are in all threat stages: before, during and after an attack.

Furthermore, it is important to note that the effectiveness of the
recommendations mentioned above will likely change over time as threat actors
adopt new tactics and techniques. Businesses should regularly evaluate the
effectiveness of their own controls and implement new adequate strategies.

Education is key to mitigating attacks. It’s in the interest of both parties,
companies, and customers, to know how to identify potentially malicious
activity. The ability to recognize when credentials might be compromised can
save a huge amount of pain and financial loss.


IMMEDIATE STEPS TO TAKE WHEN COMPROMISED CUSTOMER CREDENTIALS ARE FOUND

 * Freeze the Compromised Account – to prevent the threat actor from performing
   any fraudulent
   activities on the compromised account
 * Freeze/Cancel all ongoing transactions – ask for verification from the
   legitimate account owner
 * Force a password reset
 * Inform the legitimate account owner

Continuous cyber-hygiene can help prevent attacks, as well as mitigate their
impact if and when one happens. Threat actors are constantly testing new ways to
exploit the company’s and customer’s infrastructure, so remaining static when it
comes to security protocols is a sure way to get breached.


HOW TO DEFEND AGAINST COMPROMISED CREDENTIAL ATTACKS


HOW TO PREVENT CREDENTIAL STUFFING ATTACKS

 * Bot Detection
 * Multifactor Authentication
 * Prevent Reuse of Compromised Passwords
 * Monitor customer activity
 * Monitor customer fraud reports


HOW TO PREVENT FRAUD & MISUSE OF CUSTOMER INFORMATION

 * Use Threat Intelligence and third-party fraud detection (get a demo here)
 * Re-authenticate at the time of purchase
 * Prevent Gift Card Theft
 * Respond to credential-stuffing events by notifying customers and
   investigating and remediating the incidents.


HOW TO PREVENT ACCOUNT TAKEOVER ATTACKS

Users and website owners should take basic precautions to prevent ATO attacks:

 * Users should always read emails from financial institutions and call customer
   service
   immediately after receiving suspicious alerts.
 * Educating customers on:
   * The dangers and warning signs of phishing
   * Investigating links in emails before clicking
   * Smart Password Use
 * Deployment of MFA
 * Set a limit on login attempts
 * Configuring the fraud detection systems to display a CAPTCHA after a specific
   number of
   authentication attempts
 * Send notifications of any account changes to customers

Vulnerabilities keep on coming in different shapes and forms and it is
impossible to patch them all, including compromised credentials overnight. To
protect the organization, you first need to focus on those vulnerabilities that
mater the most. Now with Argos, known and unknown vulnerabilities are
automatically correlated between your digital assets to your attack surface,
highlighting those imminent threats that must be handled with utmost urgency.

Let's Talk
Share on Facebook Share on Twitter Share on LinkedIn Share on WhatsApp Share by
Email
Attack Surface Reconnaissance
Contact usSupport

PLATFORM

 * Attack Surface Management
 * Darkweb Threat Intelligence
 * Deep & Dark Web
 * Forensic Canvas
 * Social Media Monitoring
 * Dashboard & Reports

SOLUTIONS BY USE CASE

 * Phishing
 * Attackware
 * Brand Protection
 * Data Leakage
 * Fraud

SERVICES

 * Virtual HumINT Operations
 * Deep Cyber Investigations
 * Threat Landscape Analysis
 * Attack Simulation
 * Takedowns & Remediation
 * 3rd Party Cyber Risk

SOLUTIONS BY INDUSTRIES

 * Financial Services
 * Retail & eCommerce
 * Media and Gaming
 * Healthcare
 * Government Agencies
 * Oil and Gas
 * Manufacturing

RESOURCES

 * Blog
 * Case Studies
 * Research
 * Videos
 * Brochures
 * Legal Terms
 * Open Source Attribution
 * Ransomania

SOLUTIONS BY ROLE

 * CISO
 * Security Analyst
 * Marketing Leaders

COMPANY

 * About Us
 * Contact Us
 * Careers
 * Events
 * Media Coverage
 * Press Releases
 * News Feed

PARTNER

 * Partner Portal
 * Grow with Cyberint
 * Cyberint MSSP Program
 * Cyberint Reseller Program
 * Technology Partners
 * OEM Partners

SUBSCRIBE TO OUR NEWSLETTER



I agree to Cyberint's Terms of Use and Privacy Policy

 * I agree to subscribe to receive updates  from Cyberint
   
   *




Cyberint Copyright © All Rights Reserved 2024

 * CISO
 * Security Analyst
 * Marketing Leaders

 * English

UNCOVER YOUR COMPROMISED CREDENTIALS FROM THE DEEP AND DARK WEB

Fill in your business email to start

Email*


I agree to Cyberint's Terms of Use and Privacy Statement

 * I hereby agree to subscribe to received news, updates and offers from
   Cyberint.
   
   *


By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts.
Cookies Settings Reject All Accept All Cookies



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
Allow All


MANAGE CONSENT PREFERENCES

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices