asset thumbnail
Research Reports

Credential-Based Attacks Research

Exposing the Ecosystem and Motives Behind Credential Phishing, Theft and Abuse

Credential-Based Attacks: Exposing the Ecosystem and Motives Behind Credential Phishing, Theft and Abuse

In this white paper, Unit 42 details the ecosystem behind how adversaries steal and leverage legitimate credentials to break in and move laterally within the organization, often bypassing security controls. Learn the key attack methods currently in use, how this technique fits into attacker playbooks, and real-world guidance on preventing successful attacks.

Stay two steps ahead of threats

As a member we will keep you informed. Get exclusive invites to events, Unit 42 threat alerts, and the latest cybersecurity tips.