Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks

Posted on October 31, 2025October 31, 2025 By CWS

All through the primary half of 2025, financially motivated menace actors have shifted their method to intrusions, abandoning conventional implant-heavy strategies in favor of a cheaper technique.

Relatively than deploying refined malware payloads, attackers are leveraging stolen credentials and legitimate account entry to determine persistence inside goal networks throughout a number of industries.

The FortiGuard Incident Response staff responded to dozens of engagements, revealing a constant sample the place adversaries achieve preliminary entry via compromised credentials, that are both harvested through phishing campaigns, bought from Preliminary Entry Brokers, or obtained via password reuse and infostealer malware distribution.

Fortinet analysts recognized that attackers exploit three main preliminary entry strategies to compromise networks.

Exterior distant providers, significantly VPN infrastructure, function essentially the most prevalent entry level, permitting adversaries to authenticate utilizing stolen credentials and progress laterally via sufferer environments.

Moreover, menace actors exploit public-facing functions utilizing n-day vulnerabilities to deploy legit distant administration instruments reminiscent of AnyDesk, Atera, Splashtop, and ScreenConnect.

Compromised credentials bought from underground markets vary from $100 to $20,000 relying on organizational dimension and geographic location, making this method economically enticing for menace actors working throughout developed and rising economies.

Lateral Motion and Persistence Techniques

As soon as inside networks, Fortinet researchers famous that adversaries make use of guide, operator-driven lateral motion utilizing built-in instruments together with Distant Desktop Protocol (RDP), Server Message Block (SMB), and Home windows Distant Administration (WinRM).

This guide method allows attackers to mix with legit administrator exercise, considerably complicating detection efforts.

Sufferer Industries (Supply – Fortinet)

Adversaries preserve persistence by putting in their very own situations of distant entry instruments and leveraging privileged credentials obtained via Mimikatz execution and Zerologon exploitation for elevated account entry.

Knowledge exfiltration happens via direct file transfers through RDP and RMM interface drag-and-drop capabilities, leaving minimal forensic artifacts in comparison with standard web-based exfiltration strategies.

In noticed circumstances, attackers configured VPN infrastructure with out multi-factor authentication, granting unrestricted community entry and enabling fast encryption of hypervisor infrastructure for ransomware deployment.

This low-complexity, high-return methodology permits financially motivated adversaries to function undetected for prolonged intervals whereas avoiding the detection signatures generally related to malware-centric intrusions.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Abuse, Account, Attacks, Credentials, Financially, Fuel, Motivated, Stolen, Valid

Post navigation

Previous Post: Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data
Next Post: Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations

Related Posts

Threat Actors Leverage GenAI Platforms to Create Realistic Phishing Content Cyber Security News
Hackers Posing as Google Careers Recruiter to Steal Gmail Login Details Cyber Security News
New Gmail Phishing Attack Uses AI Prompt Injection to Evade Detection Cyber Security News
RediShell RCE Vulnerability Exposes 8,500+ Redis Instances to Code Execution Attacks Cyber Security News
PoC Exploit Released for IIS WebDeploy Remote Code Execution Vulnerability Cyber Security News
NCSC Warns of Oracle E-Business Suite 0-Day Vulnerability Actively Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations
  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks
  • Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data
  • GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations
  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks
  • Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data
  • GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News