#CredentialTheft

Pen Test PartnersPTP@infosec.exchange
2025-05-16

🖥️ VNC might be convenient for legacy systems, but it's just as convenient for attackers...
 
Unencrypted traffic makes it easy to intercept credentials. Some setups don’t require a password at all. And even when passwords are used, they’re often weakly stored and easily cracked.
 
Attackers might not even need to log in, just sniff the traffic and capture screens or keystrokes without being noticed.
 
To prove the point, our Kieran built a Python script (VncCrack.py) that cracks VNC passwords in plaintext using intercepted traffic.
 
📌Check it out in action in our latest blog post: pentestpartners.com/security-b

#CyberSecurity #PenTesting #VNC #LegacySecurity #DFIR #NetworkSecurity #CredentialTheft

When Strong Passwords Fail: Lessons from a Silent, Persistent Attack

1,038 words, 5 minutes read time.

Pro Git 2nd Edition, Kindle Edition
Affiliate Link

Today’s affiliate link features Pro Git, 2nd Edition — available for free at the time of this post. Be sure to grab your copy before the offer ends!

As an IT professional, I pride myself on maintaining robust security practices. I use unique, complex passwords, enable two-factor authentication (2FA), and regularly monitor my accounts. Despite these precautions, I recently experienced a security breach that served as a stark reminder: even the most diligent efforts can fall short if certain vulnerabilities are overlooked.

The Unexpected Breach

I maintain a Microsoft 365 Developer account primarily for SharePoint development. This account isn’t part of my daily workflow; it’s used sporadically for testing and development purposes. To secure it, I employed a 36-character random password—a combination of letters, numbers, and symbols. This password was unique to the account and stored securely.

Despite these measures, I received a notification early one morning indicating a successful login attempt from an unfamiliar location. Fortunately, 2FA was enabled, and the unauthorized user couldn’t proceed without the second authentication factor. This incident prompted an immediate investigation into how such a breach could occur despite stringent password security.

The Silent Persistence of Attackers

Upon reviewing the account’s activity logs, I discovered a disturbing pattern: months of failed login attempts originating from various IP addresses. These attempts were methodical and spread out over time, likely to avoid triggering security alerts or lockouts. This tactic, known as a “low and slow” brute-force attack, is designed to fly under the radar of standard security monitoring systems.

Such persistent attacks underscore the importance of not only having strong passwords but also implementing additional security measures. According to the Cybersecurity and Infrastructure Security Agency (CISA), 2FA is essential to web security because it immediately neutralizes the risks associated with compromised passwords. If a password is hacked, guessed, or even phished, that’s no longer enough to give an intruder access: without approval at the second factor, a password alone is useless .

The Vulnerability of Dormant Accounts

One critical oversight on my part was the assumption that an infrequently used account posed less of a security risk. In reality, dormant accounts can be prime targets for attackers. These accounts often retain access privileges but are not actively monitored, making them susceptible to unauthorized access. As noted by security experts, dormant accounts often fly under the radar, making them perfect targets for threat actors. Since they aren’t actively monitored, cybercriminals can exploit them for weeks—or even months—before being detected .

This realization led me to reassess the security of all my accounts, especially those not regularly used. It’s imperative to treat every account with the same level of scrutiny and protection, regardless of its frequency of use.

Immediate Actions Taken

In response to the breach, I took several immediate steps to secure the compromised account and prevent future incidents:

First, I changed the account’s password to a new, equally complex and unique one. Recognizing that the email address associated with the account might have been targeted, I updated it to a more obscure variation, reducing the likelihood of automated credential stuffing attacks.

Next, I thoroughly reviewed the account’s security settings, ensuring that all recovery options were up-to-date and secure. I also examined the activity logs for any other suspicious behavior and reported the incident to Microsoft for further analysis.

Finally, I conducted a comprehensive audit of all my accounts, focusing on those that were dormant or infrequently used. I enabled 2FA on every account that supported it and closed any accounts that were no longer necessary.

Lessons Learned

This experience reinforced several critical lessons about cybersecurity:

Firstly, password strength alone is insufficient. While complex passwords are a fundamental aspect of security, they must be complemented by additional measures like 2FA. According to research, implementing 2FA can prevent up to 99.9% of account compromise attacks .

Secondly, dormant accounts are not inherently safe. Their inactivity can lead to complacency, making them attractive targets for attackers. Regular audits and monitoring of all accounts, regardless of usage frequency, are essential.

Thirdly, attackers are persistent and patient. The “low and slow” approach to brute-force attacks demonstrates a strategic method to bypass traditional security measures. Staying vigilant and proactive in monitoring account activity is crucial.

Strengthening Security Measures

In light of this incident, I have adopted several practices to enhance my cybersecurity posture:

I now regularly audit all my accounts, paying special attention to those that are dormant or infrequently used. I ensure that 2FA is enabled wherever possible and that all recovery options are secure and up-to-date.

Additionally, I have started using a reputable password manager to generate and store complex, unique passwords for each account. This tool simplifies the process of maintaining strong passwords without the need to remember each one individually.

Furthermore, I stay informed about the latest cybersecurity threats and best practices by subscribing to security newsletters and participating in professional forums. This continuous learning approach helps me adapt to the evolving threat landscape.

Conclusion

This incident served as a sobering reminder that no one is immune to cyber threats, regardless of their expertise or precautions. It highlighted the importance of a comprehensive security strategy that includes strong passwords, multi-factor authentication, regular account audits, and continuous education.

I encourage everyone to take a proactive approach to cybersecurity. Regularly review your accounts, enable 2FA, use a password manager, and stay informed about emerging threats. Remember, security is not a one-time setup but an ongoing process.

If you found this account insightful, consider subscribing to our newsletter for more cybersecurity tips and updates. Share your thoughts or experiences in the comments below—we can all learn from each other’s stories.

D. Bryan King

Sources

Disclaimer:

The views and opinions expressed in this post are solely those of the author. The information provided is based on personal research, experience, and understanding of the subject matter at the time of writing. Readers should consult relevant experts or authorities for specific guidance related to their unique situations.

Related Posts

#2FA #accountHacking #accountMonitoring #accountTakeover #bruteForceAttack #cloudAccountProtection #cloudSecurity #compromisedAccount #compromisedCredentials #compromisedMicrosoftAccount #credentialStuffing #credentialTheft #cyberattack #cybercrime #cybersecurity #cybersecurityAwareness #cybersecurityLessons #developerAccountSecurity #dormantAccounts #emailSecurity #hackerPrevention #howHackersBypassMFA #identityProtection #infosec #ITProfessionals #ITSecurity #ITSecurityIncident #loginSecurity #lowAndSlowAttack #MFA #MFAImportance #Microsoft365Security #MicrosoftLogin #passwordAloneNotEnough #passwordBreach #passwordEntropy #passwordHygiene #passwordManagement #PasswordSecurity #passwordVulnerability #persistentThreats #phishingProtection #randomHashPassword #realWorldBreach #realWorldCybersecurity #securePasswords #securingDormantAccounts #securityAudit #securityBestPractices #securityBreach #SharePointDeveloperAccount #SharePointSecurity #strongPasswords #techSecurityBreach #tokenHijacking #TwoFactorAuthentication

2025-04-21

Microsoft 365 credential theft is evolving quickly!

Attackers are no longer just stealing your login—they’re using your own AI tools like Microsoft Copilot to accelerate fraud from inside your environment.

Our 4-minute video breaks down how threat actors are targeting Microsoft 365 accounts and weaponizing Copilot, Teams, SharePoint, and more to perform rapid reconnaissance, commit fraud, and exploit centralized trust systems.

Watch now to learn:

▪ How Copilot can be used against you
▪ Real phishing tactics mimicking Microsoft 365, Adobe & DocuSign
▪ Why SSO, OAuth, and poor access controls can make attacks worse
▪ What your organization must do to stay ahead

Watch the video! youtu.be/zaBwxy1Gjhc

#Microsoft365 #CredentialTheft #Cybersecurity #CoPilot #ZeroTr #Cyberaware #Cyber #SMB #CEO #CISO #CIO #Phishing #CloudSecurity #AI #M365 #Riskmanageemnt

Phillemon CEH | CTHwardenshield
2025-04-06

🚨 Oracle Breached Again – 2nd Time in 30 Days! 🔐

Hackers exploited a legacy system that’s been offline for 8 years to steal login credentials — some as recent as 2024. 😳

👉 Dive into the full story here: wardenshield.com/oracle-faces-

🛡️💻

2025-03-26

Microsoft 365 credential theft is evolving—and AI tools like Microsoft Co-Pilot are becoming attackers' latest weapons!

Watch our new, 4-minute video, to learn how attackers use #CoPilot for rapid reconnaissance and fraud, see real-world phishing examples targeting Microsoft 365, Adobe, and DocuSign, and understand why SSO and OAuth vulnerabilities significantly amplify credential risks.

We'll also share essential steps to protect your organization! youtu.be/zaBwxy1Gjhc

#Microsoft365 #CredentialTheft #Cybersecurity #CoPilotSecurity #Phishing #ZeroTrust #AIThreats #SaaSsecurity #DocuSignPhishing #M365 #Cyberaware #InfoSec #CloudSecurity

2025-03-10

New Polymorphic browser attack alert: Malicious extensions mimic legitimate ones with pixel-perfect clones, disabling the real add-ons to steal credentials from Chrome, Edge & others!

The malicious extensions clone the look and behavior of legitimate add-ons, including icons and workflows, and even temporarily disable the real extensions—tricking users into handing over sensitive credentials. Remind your team to only install extensions from trusted sources, monitor browser activity, and review permissions often.

Read the details: thehackernews.com/2025/03/rese

#Cybersecurity #CISO #infosec #DFIR #ITsecurity #Chrome #Phishing #Malware #Infosec #CredentialTheft #Chromium #ZeroDay #PolymorphicAttack

Pen Test PartnersPTP@infosec.exchange
2025-02-18

Unauthorised network access remains a significant threat, especially for organisations lacking robust network security controls. Attackers can capture privileged credentials from automated tasks and vulnerability scanners if these tasks are configured with an excessive scope or are insufficiently protected by network or host controls...

Read our latest blog, "Watch where you point that cred," by Tom Thomas-Litman, for insights and recommendations for securing internal networks: pentestpartners.com/security-b

#CyberSecurity #Infosec #NetworkSecurity #VulnerabilityScanning #CredentialTheft #Honeypots #LeastPrivilege #RiskMitigation

2025-01-24

The Register: Supply chain attack hits Chrome extensions, could expose millions. “Cybersecurity outfit Sekoia is warning Chrome users of a supply chain attack targeting browser extension developers that has potentially impacted hundreds of thousands of individuals already. Dozens of Chrome extension developers have fallen victim to the attacks thus far, which aimed to lift API keys, session […]

https://rbfirehose.com/2025/01/24/the-register-supply-chain-attack-hits-chrome-extensions-could-expose-millions/

nemo™ 🇺🇦nemo@mas.to
2024-12-29

🚨 Security Alert! 🚨 A recent attack has compromised 16 Chrome extensions, exposing over 600,000 users to data theft! 🛡️ Cyberhaven was among the first affected, with malicious code stealing sensitive information. This highlights the vulnerabilities of browser extensions. Stay safe and review your installed extensions! 🔍✨ #CyberSecurity #ChromeExtensions #DataProtection #PhishingAttack #CredentialTheft thehackernews.com/2024/12/16-c #newz

2024-12-12

I'd love to see Flare go the next step and automatically enroll compromised credentials into a passwordless authentication mechanism.

#security #cybersecurity #CredentialTheft #IdentitySecurity #Authentication #IAM #Funding #Passwordless
techcrunch.com/2024/12/11/flar
3/3

2024-11-19

A new Fortinet VPN zero-day vulnerability is being exploited by a toolkit called 'DeepData'. The #security gap allows credential dumping from memory after authentication. Until a patch is available, you should restrict VPN access and monitor for unusual login activity. IOCs are available in this article: bleepingcomputer.com/news/secu

#Cybersecurity #ZeroDay #Fortinet #ThreatIntel #CredentialTheft #IT #Databreach #DFIR

Defensorumdefensorum
2024-10-07

🔐 Over 140,000 credentials stolen by Sniper DZ’s phishing scams! 🚨 Is your data properly secure? Time for stronger defenses! defensorum.com/how-sniper-dz-e

Sean Whalen 👨🏼‍🦼🏳️‍🌈🇺🇦🕊️seanthegeek@infosec.exchange
2024-10-02

The Russian cybercrime group FIN7 ran a network of fake AI undressing sites that delivered credential stealing malware to those who uploaded pictures. I gotta say, this is one group of cybercrime victims that I don't feel sorry for.

silentpush.com/blog/fin7-malwa

#FIN7 #Russia #Cybercrime #NetSupport #NetSupportRAT #RAT #Malware #CredentialTheft #AI #Deepfake #Deepfakes #DeepNude #DeepNueds #SilentPush

2024-09-28

Ransomware Gang Strikes With Stolen Microsoft Entra ID Credentials
In a recent cyber attack that has sent shockwaves through the tech world, a ransomware gang has struck with stolen Microsoft Entra ID credentials.

cloudhosting.evostrix.eu/ranso

2024-09-16

Cybercriminals Steal Credentials With HTTP Headers in Massive Phishing Schemes
In the ever-evolving world of cybercrime, hackers are constantly finding new ways to steal sensitive information from unsuspecting victims...

cloudhosting.evostrix.eu/cyber

Paul Shreadpshread@masto.ai
2024-08-15

A cloud vulnerability a lot of people apparently don't know about: .env files contain secrets such as hard-coded cloud access keys, and not configuring them properly can lead to very bad things.
#Cloud #CloudSecurity #AWS #Vulnerabilities #IAM #CredentialTheft #CloudStorage #Security #Cybersecurity #AttackSurfaceManagement #VulnerabilityManagement

thecyberexpress.com/cloud-exto

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst