Credential phishing leads to compromised accounts, and compromised accounts lead to more credential phishing.

In order to uncover the mechanics, the Agari Cyber Intelligence Division seeded more than 8,000 phishing sites with fake credentials and then monitored what happened next. In this report, you’ll discover more about how cybercriminals access and use compromised accounts, including

  • How 50% of all compromised accounts are accessed within 12 hours,
  • Where the cybercriminals are located across Africa, North America, and Europe,
  • How threat actors pivot to OneDrive and SharePoint to host malicious documents, and
  • Which tactics cybercriminals take to continue compromising additional accounts.

Make sure you’re armed with this crucial threat intelligence. Download the report today.

Want to learn more from the experts behind this research? Join us for a webinar on June 23rd for a deep dive into the research and extensive Q&A. Register here.

silent-starling-featured
white papers
White Paper
Silent Starling Threat Dossier: BEC to VEC

Vendor email compromise is a ...

Learn more
white papers
White Paper
Scattered Canary Threat Dossier

Business email compromise (BEC) has ...

Learn more
white papers
White Paper
Cosmic Lynx Threat Dossier: The Rise of Russian BEC

Cosmic Lynx is a Russia-based ...

Learn more

Cosmic Lynx is a Russia-based BEC cybercriminal organization that has significantly impacted the email threat landscape with sophisticated, high-dollar phishing attacks.

In this threat dossier, you’ll discover key details about Cosmic Lynx, including:

  • How Cosmic targets global corporations with incredibly sophisticated BEC attacks
  • How Cosmic Lynx exploits DMARC controls to impersonate corporate executives
  • How Cosmic Lynx has leveraged COVID-19 in their attacks

Download today to make sure you stay ahead of this new, high-risk BEC attack.

Close button
Mail Letter

Would you like the confidence to trust your inbox?