Anatomy of a Compromised Account: How BEC Actors Use Credential Phishing and Exploit Compromised Accounts

Anatomy of a Compromised Account: How BEC Actors Use Credential Phishing and Exploit Compromised Accounts

In a growing trend known as credential phishing, threat actors impersonate legitimate brands and services by crafting similar-looking websites where unsuspecting users enter their account information.

To uncover the mechanics, the Agari Cyber Intelligence Division seeded more than 8,000 phishing sites with fake credentials and then monitored what happened next. In this report, you will discover more about how cybercriminals access and use compromised accounts, including:

  • How 50% of all compromised accounts are accessed within 12 hours
  • Where the cybercriminals are located across Africa, North America, and Europe
  • How threat actors pivot to OneDrive and SharePoint to host malicious documents
  • Which tactics cybercriminals take to continue compromising additional accounts

Make sure you are armed with this crucial threat intelligence. Download the report today.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.