Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise

March 25, 2026

LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader

March 25, 2026

Cloud Phones Linked to Rising Financial Fraud Threat

March 25, 2026
Facebook X (Twitter) Instagram
Wednesday, March 25
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Hackers Exploit Compromised Enterprise Identities at Industrial Scale
Cyber Security

Hackers Exploit Compromised Enterprise Identities at Industrial Scale

Team-CWDBy Team-CWDMarch 25, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Cyber attackers have become so prolific at abusing legitimate enterprise accounts and identity systems to compromise networks that it has become a “mass-marketed impersonation crisis,” security analysts at SentinelOne have warned.

This creates a problem, because an adversary using valid credentials does not look like an intruder; they look like a regular employee – and because of this, many traditional cybersecurity protections do not identify that something is wrong, leaving organizations vulnerable to cyber threats.

In many cases, the malicious threat is only identified after an event has occurred, such as sensitive corporate data being stolen, systems being encrypted with ransomware, or another form of harmful cyber-criminal activity.

Published on March 24, the SentinelOne Annual Threat Report for 2026, warned that the last year has seen threat actors execute shift towards these identity-based attacks at “industrial scale”.

Commonly, accounts are compromised by social engineering campaigns, exploiting attacks techniques like ClickFix, which are designed to ensure that the victim is completely unaware their account has been compromised.

Even when accounts are protected with multi-factor authentication (MFA) attackers have ways to bypass or subvert this additional barrier to takeover.

MFA bypass kits are readily available to cybercriminals, while some attacks just use brute force, overwhelming targets with authentication requests until they get fed up and say yes.

The report warned there have been cases where attackers have been able to compromise high-level accounts, then use the admin privileges of that account to provide access to other accounts of interest.

“We have documented cases where threat actors, having compromised a high-level security administrator account, accessed management portals to disable MFA requirements for entire organizational groups,” said SentinelOne.

“These represent extreme risk because the adversary transitions from a transient squatter in a single session to a policymaker who can dictate the rules of access for the entire network.”

Fake Employees and the New Insider Threat

Campaigns based entirely on fake personas, which attackers use to apply for remote jobs, are a growing threat to organizations. If successfully employed – often having conducted interviews with the aid of AI deepfake technology – the attacker has their own legitimate access to company systems to conduct malicious activity from the inside.

State-backed North Korean hackers are known to leverage this kind of attack.

SentinelOne said that it has tracked over 1000 job applications and roughly 360 fake personas linked to North Korean operations which had attempted to secure remote employment at Western tech companies. The end goal of these campaigns is commonly theft, be that of money, intellectual property or data.

“Because the adversary inherits or creates a trusted state, the intrusion remains effectively invisible until the account begins performing actions that sit outside the user’s normal role, such as bulk data exports or unauthorized permission changes,” warned the report.

To help counter the growth in identity-based attacks, SentinelOne recommended that organizations must have the ability to identify and prevent malicious behavior being conducted by seemingly legitimate accounts.

“Defending against this requires shifting focus from simple login validation to continuous post-authentication behavioral monitoring,” the company said.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleUS: FCC Bans Foreign-Made Routers Over National Security Concerns
Next Article AI is Everywhere, But CISOs are Still Securing It with Yesterday’s Skills and Tools, Study Finds
Team-CWD
  • Website

Related Posts

Cyber Security

RSAC: UK NCSC Head Urges Industry to Develop Vibe Coding Safeguards

March 25, 2026
Cyber Security

Citrix Urges Immediate Patching for Critical NetScaler Vulnerabilities

March 24, 2026
Cyber Security

Cybersecurity Staff Don’t Know How Fast They Could Stop AI Attacks

March 23, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

How chatbots can help spread scams

October 14, 2025

How the always-on generation can level up their cybersecurity game

September 11, 2025

A quick guide to recovering a hacked account

March 21, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.