The article discusses the increasing threat of credential theft in cybercrime. According to the 2023 Verizon Data Breach Investigation Report, external parties were responsible for the majority of breaches, with 49% involving stolen credentials. Social engineering, particularly phishing, is a popular method for stealing credentials.
Phishing techniques have evolved to include multi-channel attacks, targeting mobile devices, and utilizing AI to create more credible phishing content. Phishing-as-a-service (PhaaS) has also emerged as a business model, allowing even novice threat actors to launch successful attacks using phishing kits sold on underground forums.
The article highlights two advanced phishing tools: the W3LL Panel and the Greatness phishing kit. The W3LL Panel bypasses multi-factor authentication and has been used to infiltrate thousands of corporate Microsoft 365 accounts. Greatness incorporates multi-factor authentication bypass capability and redirects victims to a phony Microsoft 365 login page.
The underground market for stolen credentials is thriving, with billions of credentials for sale on the Dark Web. The price varies depending on the account type, with cloud credentials being relatively inexpensive compared to bank account logins.
The risks of stolen credentials are heightened when end-users reuse passwords across multiple accounts. Threat actors often sell the stolen credentials to other actors for financial gain, leading to further malicious activities.
The article concludes by suggesting steps to secure user credentials, such as blocking compromised passwords and implementing stronger password policies. It recommends using tools like Specops Password Policy with Breached Password Protection to prevent the use of known compromised passwords and enforce stronger security measures.
Source link
