Credential Theft

Learn about Credential Theft and protect your organization with resources from Cofense

53 %

The Cofense PDC found 67% of phishing emails are designed to steal user credentials

110 %

Over the past year, Cofense saw a 150% increase in the use of HTML attachments in credential phishing attacks

40 %

Of the credential phishing attacks Cofense observed, 52% were branded as Microsoft

What is credential theft?

Credential theft is when threat actors steal credentials to gain access, bypass an organization’s security measures, and steal sensitive data. Once access is gained to an internal account, they can launch more widespread and malicious attacks across an organization’s network. Phishing is the most common form of entry because it is inexpensive and efficient. Security awareness training is critical to train employees to identify and report these attacks before your organization’s finances and reputation are at risk. 

  • Credentials are highly valuable. They provide adversaries access to sensitive accounts and information without setting off security alarms.
  • Credential phishing pages are inexpensive to host and attackers can easily change the infrastructure of these malicious webpages. 
  • Credential phishing attacks leave few indicators of compromise (IOCs), making breach investigations difficult.
  • Threat actors abuse trusted collaboration sites and cloud providers including Microsoft, Google, Adobe, and DropBox to deliver credential phishing attacks and malware.

Follow our handy checklist to ensure your organization stays protected.

Additional Resources

Frequently Asked Questions

Credential theft is a cybercrime involving the unlawful attainment of an organization’s or individual’s password(s) with the intent to access and abuse/exfiltrate critical data and information.
Credential theft is a type of cybercrime that involves stealing a victim’s proof of identity. Once credential theft has been successful, the attacker will have the same account privileges as the victim. Stealing credentials is the first stage in a credential-based attack.
Credential theft occurs when malicious actors steal login details and use them to access services or applications to steadily elevate their privileges, or access bank accounts, e-commerce websites, and other platforms as a customer.

Search

We use our own and third-party cookies to enhance your experience by showing you relevant content, personalizing our communications with you, and remembering your preferences when you visit our website. We also use them to improve the overall performance of our site. You can learn more about the cookies and similar technology we use by viewing our privacy policy. By clicking ‘Accept,’ you acknowledge and consent to our use of all cookies on our website.

This site is registered on wpml.org as a development site.