Transcript
Page 1: INFOGRAPHIC: 3 Ways to Steal Corporate Credentials

3 Ways to Steal Corporate

CREDENTIALS

an IBM Company

Cybercriminals use malware like Remote Access Trojans (RATs) and key-loggers to capture sensitive data, including corporate credentials, from victims' devices.

Cybercriminals create phishing sites, which are malicious web pages that look identical to legitimate sites, to trick employees into giving up their corporate credentials. Credentials submitted to a phishing site are sent straight to the criminal.

Cybercriminals attack public sites, such as social and eCommerce sites, because they know users tend to re-use their corporate credentials. When a public site's user database is breached, corporate credentials can be exposed.

Malware:RATs, Key-loggers

& MorePhishing

Sites

* * * * * *Password

Re-use of Corporate Credentials

on Public Sites

* * * * * *

www.

Trusteer Apex protects corporate credentials from advanced information-stealing malware, data ex�ltration, and sophisticated cyberattacks. When Trusteer Apex is installed on an employee endpoint, sensitive business information stays safe.

Docs

Docs

INFILTRATED

* * * * * *Password:

Criminal Access

Recommended