How Are Employee Logins Compromised?

by | Cybersecurity, Dark Web

Passwords are a twentieth-century solution to a modern-day problem. Unfortunately, user names and passwords are still the most common method for logging into services including corporate networks, social media sites, e-commerce sites, and others. Even worse, 39% of adults in the U.S are using the same or very similar passwords for multiple online services. As a result, compromising usernames and passwords represent the keys to the kingdom for malicious attackers and cybercriminals. So how are employee logins compromised?

Phishing

  • Send emails disguised as legitimate messages
  • Trick users into disclosing credentials
  • Deliver malware that captures credentials

Watering Holes

  • Target a popular site: social media, corporate intranet
  • Inject malware into the code of the legitimate website
  • Deliver malware to visitors that captures credentials

Malvertising

  • Inject malware into legitimate online advertising networks
  • Deliver malware to visitors that captures credentials

Web Attacks

  • Scan internet-facing company assets for vulnerabilities
  • Exploit discovered vulnerabilities to establish a foothold
  • Move laterally through the network to discover credentials

A criminal dealing in stolen credentials can make tens of thousands of dollars selling them to multiple buyers. With multiple buyers, organizations can easily be under digital assault from dozens or even hundreds of attackers in multiple ways including:

  • Sending spam from compromised email accounts
  • Deface web properties and host malicious content
  • Install malware on compromised systems
  • Compromise other accounts using the same credentials
  • Exfiltrate sensitive data (data breach)
  • Identity Theft

While there is always a risk that attackers will compromise a company’s system through advanced attacks, most data breaches exploit common problems such as known vulnerabilities, unpatched systems, and unaware employees. Only by implementing a suite of tools – dark web monitoring, data leak prevention, multifactor authentication, employee security awareness training, and others – can organizations protect their business from the perils of the dark web.

Samantha Yip from ID Agent joined Pearl President & COO, Floyd Bell, for a chat about how critical your employees are as the first line of defense against cyber attacks and how you can educate and empower them to protect your business. Watch the 35-minute webinar

Steps to a Smooth IT Partner Transition

Steps to a Smooth IT Partner Transition

Switching to a new IT provider can feel like a daunting task, but with the right plan in place, you can ensure a smooth and hassle-free switch. While our team handles a lot of the work on the back end to make things easier for our clients, here are the steps to a...

read more
Most Common IT Vulnerabilities

Most Common IT Vulnerabilities

There are a few common IT vulnerabilities we see over and over again when we do risk assessments. Let’s break down the top five and how to avoid them. 1. Unpatched Systems: Imagine you bought a fancy new car but never took it for a service. Eventually, it’s going to...

read more
The Illusion of Free Software

The Illusion of Free Software

Leaders of small to mid-sized businesses with more limited budgets than their enterprise counterparts may be tempted to take advantage of free software. Free antivirus, free VPNs, free productivity tools—it all sounds great, right? Unfortunately, these free solutions...

read more

Let's chat about how we can help.

Call us at 636.949.8850, grab a spot on our calendar, or fill out this form and we will reach out to you.

  • This field is for validation purposes and should be left unchanged.