Credential theft

Summary

Capturing stolen credentials is a useful outcome of modern phishing attacks, even in the era of widespread MFA usage. Stolen credentials can be used to:

  • Spray across business apps to take advantage of password reuse and the absence of MFA on apps without MFA enforcement aka. credential stuffing.
  • Use alongside SIM swapping and MFA fatigue attacks to bypass MFA for accounts without phishing-resistant MFA enrolled.

Examples