Data breaches come in all shapes and sizes. Could you spot one?
Ransomware
Ransomware is a type of malware that locks a victim’s data or device and threatens to keep it locked or worse unless the victim pays a ransom to the attacker. Ransomware attacks have evolved to include double-extortion (threatening to steal the victim’s data and leaking it online) and triple-extortion attacks (threatening to use the stolen data to attack the victim’s customers or business partners.)
Phishing Attacks
Phishing attacks are fraudulent emails, text messages, phone calls or web sites designed to trick users into downloading malware, sharing sensitive information or personal data. The attacker typically disguises themselves as a person or organization the victim trusts. They will create a sense of urgency that drives the victim to act rashly.
Credential Stuffing
The hackers have got your credentials and are now going to attempt to log into multiple accounts under the assumption that, like many businesses, your end-users reuse the same password. If they're right, this gives them access to highly sensitive accounts, including administration rights.
Business Email Compromise (BEC)
Business Email Compromise (BEC) is a type of phishing or social engineering attack that primarily targets senior executives and finance department staff. The malicious party launching the attack impersonates someone with decision-making authority, likely someone who can authorize a financial transaction, provide system access, or release sensitive data.
Account Takeover (ATO) & Keylogging
Account Takeover (ATO) & Keylogging is the result of criminals using stolen credentials to gain access and control of user accounts for monetary gain or to commit fraud. Once in charge, the criminal can drain the account of funds and us the account for further acts of fraud.
Threat Actor
Threat actors, also known as cyber threat actors or malicious actors, are individuals or groups that intentionally cause harm to digital devices or systems. Threat actors exploit vulnerabilities in computer systems, networks, and software to perpetuate a variety of cyberattacks, including phishing, ransomware, and malware attacks.
80%
of data breaches due to weak, stolen or reused passwords.
Recent Data Breaches
BreachForums.is
December 2023
100 million credentials exposed
mop
October 2023
2.1 million users email addresses leaked
Cracked.to
August 2023
250 million emails and passwords shared
Polish Credential Leak
May 2023
Over 6 million credentials and URLs leaked
Why use our database of breached passwords?
Our Password Breach Database is the world’s largest vendor-managed enterprise-grade password breach database containing 50% more password data than HaveIBeenPwned.
With approximately one million breach updates daily, our database holds a wealth of information about compromised credentials (over 8 billion) and clear text passwords (over 1.4 billion).
Find out more about a detailed Active Directory Audit
If you are ready to book a demo, simply click the button below and we will arrange a demo and discussion on your Active Directory Audit
Where protecting systems and information really matters, you
will find Intercede. Whether its citizen
data, aerospace and defense systems, high-value financial transactions,
intellectual property or air traffic control, we are proud that many leading
organizations around the world choose Intercede solutions to protect themselves
against data breach, comply with regulations and ensure business continuity.