202110 Jun
Scammers Access 50% of Compromised Accounts Within 12 Hours, According to New Research
General News

After successfully submitting credentials, the team linked individual phishing attacks to specific actors and their post-compromise actions in order to better understand the lifecycle of the compromised account. Based on the content of these documents, it’s likely that they were intended to be used as part of a BEC attack, presumably one impersonating the real estate investment trust and targeting the senior living community operator, trying to trick them into paying more than $200,000 in outstanding rent. Press Contacts EMEA: Michael Bartley, C8 Consulting michael@c8consulting.co.uk North America: Angela Tuzzo, MRB Public Relations atuzzo@mrb-pr.com Foster City, CA, June 10, 2021 --( PR.com )-- Agari by HelpSystems, the market share leader in phishing defense for the enterprise, unveiled today the results of an investigation into the anatomy of compromised email accounts. The threat intelligence brief, titled, "Anatomy of a Compromised Account," is the first research of its kind, showcasing how threat actors use credential phishing sites to gather passwords, and what they do with them post-compromise.The Agari Cyber Intelligence Division (ACID) completed a six-month investigation by seeding more than 8,000 phishing sites mimicking Microsoft Account, Microsoft Office 365, and Adobe Document Cloud login screens. Learn more at www.helpsystems.com.Press ContactsEMEA:Michael Bartley, C8 Consultingmichael@c8consulting.co.ukNorth America:Angela Tuzzo, MRB Public Relationsatuzzo@mrb-pr.com Click here to view the list of recent Press Releases from Agari

  • Security
  • Fintech & Banking
  • Data Management
  • AI & Machine learning
  • Languages & compilers
  • General BI
  • Business Intelligence
  • Scheduling
  • Calendar, Scheduling