Upload
ibm-security-systems
View
632
Download
0
Embed Size (px)
DESCRIPTION
Learn more: http://securityintelligence.com/3-ways-steal-corporate-credentials/ Cybercriminals are always on the hunt for user credentials (user name and password). If you have someone’s credentials, you can log into their systems, access valuable data, and perform fraudulent transactions on their behalf. Credentials are typically extracted by cybercriminals in one of three ways.
Citation preview
3 Ways to Steal Corporate
CREDENTIALS
an IBM Company
Cybercriminals use malware like Remote Access Trojans (RATs) and key-loggers to capture sensitive data, including corporate credentials, from victims' devices.
Cybercriminals create phishing sites, which are malicious web pages that look identical to legitimate sites, to trick employees into giving up their corporate credentials. Credentials submitted to a phishing site are sent straight to the criminal.
Cybercriminals attack public sites, such as social and eCommerce sites, because they know users tend to re-use their corporate credentials. When a public site's user database is breached, corporate credentials can be exposed.
Malware:RATs, Key-loggers
& MorePhishing
Sites
* * * * * *Password
Re-use of Corporate Credentials
on Public Sites
* * * * * *
www.
Trusteer Apex protects corporate credentials from advanced information-stealing malware, data ex�ltration, and sophisticated cyberattacks. When Trusteer Apex is installed on an employee endpoint, sensitive business information stays safe.
Docs
Docs
INFILTRATED
* * * * * *Password:
Criminal Access