Identity Theft (part 1)

Identity Theft (part 1)

Identity theft, as cyber attacks go, is pretty easy to understand – a threat actor gains control of a user’s credentials (identity) and then attacks the service (organisation), posing as that user. There are nuances but that is the attack in the briefest of terms.?

Credential and identity theft are being undertaken by the threat actor community on an industrial scale, through info-stealing malware, social engineering attacks, phishing emails, compromised websites, user carelessness, etc., etc.. The shift in recent years to organisations large and small migrating to a SaaS (Software-as-a-Service) operating model, and the success of Microsoft 365 and Google Workplace to facilitate this move, have greatly increased the attack surface. Some may also point at the increase in forward-looking organisations, who value their teams, and offer hybrid working as a risk factor – but from experience a user is as likely to give away their credentials in a secure office as they are to do it sitting at the dining room table.?

Why does the move to SaaS encourage identity theft??

The move to SaaS has increased the amount of work your people do online in the browsers – many saving valuable credentials in those browsers. Even if they use the Word app on their laptop, the resulting document will be stored in SharePoint or OneDrive in the cloud. These are two of the main reasons that threat actors are actively involved in stealing and/or buying (from the Dark Web) credentials, they can unlock vast resources of information, opening the doors to exploitation and monetisation of the hack.?

Identity Theft and the Snowflake Attack?

2024 turned out to be the “Year of Identity Theft” with many organisations, such as Microsoft and MGM Resorts, suffering breaches that could be traced to an employee’s identity being misused (Push Security, 2025). However, the breach on Snowflake – a US-based cloud-based data storage company, providing data services to a range of multinational companies such as Ticketmaster and Santander Bank – made the headlines as one of the largest data breaches ever. The personal information of hundreds of millions of clients of 165 organisations using Snowflake was exposed in this data breach. The attack and subsequent response by the organisations and users impacted made world headlines. (Lakshmanan, 2024.)?

How??

For the how and your takeaway on this type of identity attack you will need to read part two, on CyberAwake.?

要查看或添加评论,请登录

Clive Catton的更多文章

  • Apple, The UK Government, UK Apple users and Encryption

    Apple, The UK Government, UK Apple users and Encryption

    This story just keeps going on… For those of you that need a catch-up, here are my article about the argument between…

  • When technical cyber security fails you…

    When technical cyber security fails you…

    It is not unreasonable to say that ransomware is at epidemic levels, report after report says that malware, ransomware…

  • My Valentine is a Geek…

    My Valentine is a Geek…

    Having done Groundhog Day and Cyber Security, it looks like it is me who is going to have to squeeze IT Support into…

  • Get Organised – Business Continuity and Recovery

    Get Organised – Business Continuity and Recovery

    As the first month of 2025 draws to a close I am going to add one more article to Diana’s “Get Organised” project, this…

  • Email Encryption

    Email Encryption

    Today’s Wednesday Bit is a guest article by Martin from Octagon Technology, looking at email encryption and Microsoft…

  • Threat Actors want your Microsoft 365 Credentials

    Threat Actors want your Microsoft 365 Credentials

    Many of my cyber security investigations have involved the compromise of Microsoft 365 credentials. These are a…

  • It is real, Windows 10 is going!

    It is real, Windows 10 is going!

    Our team over at Octagon Technology have been talking about this for over a year – Microsoft is really doing away with…

  • Back-to-Basics – A Phishing Email Primer

    Back-to-Basics – A Phishing Email Primer

    I am having a break this week from the “Wednesday Bit”, but what I do have for you is my today is my completed Phishing…

  • When paperwork is paperwork!

    When paperwork is paperwork!

    Last week I wrote about the paperwork associated with a well-run BYOD project and policy. Although I spoke about…

  • Your BYOD Policy – Keeping the Paperwork Straight (pt.6)

    Your BYOD Policy – Keeping the Paperwork Straight (pt.6)

    So, you have decided that Bring Your Own Device (BYOD) is something that you can work with – rather than something that…

    1 条评论

社区洞察