From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover

The average person uses some 191 services that require them to enter passwords or other credentials. That’s a lot to keep on top of, and it presents a huge problem if compromise occurs, particularly if a person uses the same credentials across multiple services. Over the past 2.5 years, the Digital Shadows Photon Research team has been analyzing how cybercriminals conspire to prey upon users of online services by “taking over” the accounts they all use on an everyday basis―for banks, to stream videos or music, for work―the list goes on.

For this paper we closely examine this ubiquitous problem, including how attackers approach account takeovers (ATO). Using the Digital Shadows SearchLightTM service, which maintains a database of breached credentials and scours criminal forums for attackers’ trends, data dumps, advertisements and tools.

For more, check out our blog on the topic here: https://digitalshadows.com/blog-and-research/from-exposure-to-takeover-part-1-beg-borrow-and-steal-your-way-in/

Watch our on-demand webinar on the topic here: https://resources.digitalshadows.com/webinars/account-takeover-webinar

 

 

 

 

Previous Post
Digital Shadows Analysis of Europol’s Cybercrime Report
Digital Shadows Analysis of Europol’s Cybercrime Report

In early October 2020, Europol released their Internet Organized Crime Threat Assessment (IOCTA) 2020, deta...

Next Post
Special: Guest David Bianco Talks Origin Story, Pyramid of Pain, and More
Special: Guest David Bianco Talks Origin Story, Pyramid of Pain, and More

ShadowTalk hosts Alex and Digital Shadows CISO, Rick, talk to special guest David about his beginnings in t...

×

Threat Intel Fan?

Sign up below to get our TI updates delivered to your inbox!

First Name
Last Name
Company
Country
State- optional
Job Title
Thank you!
Error - something went wrong!