Connect with us

Blockchain

New Report Reveals How Long Hackers Keep Using Compromised Accounts

Security firm Barracuda Networks and UC Berkeley have jointly researched cybercriminals’ behavior once they take over accounts, specifically focusing on the end-to-end lifecycle of a breached account. The parties investigated 159 compromised accounts across 111 organizations in a bid to find out how threat actors take over accounts, how long attackers remain in compromised accounts, and how they use and extract information from these accounts.

Dwelling in the Account for Weeks or Even Months

According to a report published on July 23, some bad actors remain in compromised accounts for weeks or even months, with 33% of attackers dwelling in the account for over a week. The report’s findings indicate the following:

  • Nearly 80% of threat actors did not access any applications outside of email,
  • 20% of breached accounts appear in at least one online password data breach,
  • 31% of compromises reflect an increasingly specialized market for account compromise.

To get access to email accounts and steal credentials, hackers opt for brand impersonation and phishing. The report further explains:

“Once the account is compromised, hackers monitor and track activity to learn how the company does business, the email signatures they use, and the way financial transactions are handled, so they can launch subsequent phishing attacks, including harvesting financial information and additional login credentials for other accounts.”

Sometimes hackers reportedly sell stolen login credentials to other threat actors, and thus a different attacker continues using the compromised account mining for information and extracting value from it.

Focus on Corporate Networks

The researchers discovered that in 98% of breached accounts, hackers accessed at least one email-related Office 365 app, including Microsoft Outlook. This reportedly enabled them to obtain access to contact lists and relate that data with any confidential and financial information of the employee and the organization. As previously reported by forklog.media, hackers seem to have shifted their focus from individual servers to corporate networks. In the second half of 2019, the number of postings on illicit marketplaces offering access to corporate networks reportedly began surging. Follow us on Twitter and Facebook and join our Telegram channel to know what’s up with crypto and why it’s important.

Avatar

Published

on

Security firm Barracuda Networks and UC Berkeley have jointly researched cybercriminals’ behavior once they take over accounts, specifically focusing on the end-to-end lifecycle of a breached account.

The parties investigated 159 compromised accounts across 111 organizations in a bid to find out how threat actors take over accounts, how long attackers remain in compromised accounts, and how they use and extract information from these accounts.

Dwelling in the Account for Weeks or Even Months

According to a report published on July 23, some bad actors remain in compromised accounts for weeks or even months, with 33% of attackers dwelling in the account for over a week.

The report’s findings indicate the following:

  • Nearly 80% of threat actors did not access any applications outside of email,
  • 20% of breached accounts appear in at least one online password data breach,
  • 31% of compromises reflect an increasingly specialized market for account compromise.

To get access to email accounts and steal credentials, hackers opt for brand impersonation and phishing. The report further explains:

“Once the account is compromised, hackers monitor and track activity to learn how the company does business, the email signatures they use, and the way financial transactions are handled, so they can launch subsequent phishing attacks, including harvesting financial information and additional login credentials for other accounts.”

Sometimes hackers reportedly sell stolen login credentials to other threat actors, and thus a different attacker continues using the compromised account mining for information and extracting value from it.

Focus on Corporate Networks

The researchers discovered that in 98% of breached accounts, hackers accessed at least one email-related Office 365 app, including Microsoft Outlook. This reportedly enabled them to obtain access to contact lists and relate that data with any confidential and financial information of the employee and the organization.

As previously reported by forklog.media, hackers seem to have shifted their focus from individual servers to corporate networks. In the second half of 2019, the number of postings on illicit marketplaces offering access to corporate networks reportedly began surging.

Follow us on Twitter and Facebook and join our Telegram channel to know what’s up with crypto and why it’s important.

Subscribe to our Newsletter

Source: https://forklog.media/new-report-reveals-how-long-hackers-keep-using-compromised-accounts/

Continue Reading

Blockchain

Avatar

Published

on

Source:

Continue Reading

Blockchain

Avatar

Published

on

Source:

Continue Reading

Blockchain

Avatar

Published

on

Source:

Continue Reading
Blockchain3 hours ago

Blockchain3 hours ago

Blockchain3 hours ago

Blockchain3 hours ago

Blockchain3 hours ago

Blockchain3 hours ago

Blockchain3 hours ago

Blockchain3 hours ago

Blockchain3 hours ago

Blockchain3 hours ago

Saas3 hours ago

Saas3 hours ago

Saas3 hours ago

Saas3 hours ago

Saas3 hours ago

Saas3 hours ago

Saas3 hours ago

Saas3 hours ago

Saas3 hours ago

Saas3 hours ago

Blockchain3 hours ago

Don’t Get Hoodwinked by Hidden Bitcoin Trading Fees

Blockchain3 hours ago

Yearn Finance Continues Growing with Latest DeFi Acquisitions

Press Releases3 hours ago

UMKM EXPO(RT) Brilianpreneur 2020 ofrece el escenario mundial para más de 400 MSME indonesias líderes

Blockchain3 hours ago

Win Huge Crypto Promos at Sportsbet.io

Press Releases4 hours ago

Cinco naciones se unen para lanzar la Organización de Cooperación Digital para lograr un futuro digital para todos

Press Releases4 hours ago

Targi UMKM EXPO(RT) Brilianpreneur 2020 – globalna scena dla ponad 400 najlepszych małych i średnich przedsiębiorstw z Indonezji

Blockchain4 hours ago

Play Neon Rush: Splitz at BitStarz Casino

Blockchain4 hours ago

Tezos, Augur, Verge Price Analysis: 30 November

Press Releases4 hours ago

Carleton ‘Holly’ Hollister’s New Book ‘Getting There’ is an Encouraging Journey That Helps Individuals Attain Personal and Professional Fulfillment in Life

Press Releases4 hours ago

Joel Schlesinger’s New Book ‘The Risk-Takers: American Leaders in Desperate Times’ is a Compelling Read That Delves Into America’s Brand of Leadership Throughout History

Press Releases4 hours ago

Wanda Fowler’s New Book ‘Belle’s Story’ is a Heartwarming Tale About a Little Dog’s Journey of Finding Her Perfect and Eternal Home

Press Releases4 hours ago

Carol Stern’s New Book ‘The Tiny Lamb’ is a Meaningful Tale About Believing in Oneself and One’s Purpose

Press Releases4 hours ago

Julia Haynes’ New Book ‘As He Said’ Accounts a Riveting Tale in a Town Challenged by New Rules and New Systems

Press Releases4 hours ago

Sentinel Midstream’s “Texas GulfLink” Deepwater Port Achieves Major Milestone

Press Releases4 hours ago

S&P Global and IHS Markit to Merge in All-Stock Transaction Valuing IHS Markit at $44 Billion, Powering the Markets of the Future

Blockchain4 hours ago

Top Crypto Gifts for the 2020 Holiday Season

Blockchain4 hours ago

Bitcoin’s Weekend Bullish Rebound is “Fakeout,” Analyst Explains Why

Private Equity4 hours ago

Europe’s 50 Most Influential in Private Equity

Blockchain4 hours ago

Malta AI & Blockchain Summit CEO: Malta Intends to Remain Pioneer in Digital World

Blockchain4 hours ago

Bitcoin Recovers After Sharp Drop Below Support

Trending