Credential Harvesting at Scale Without Malware - Cyber Security Review
Menu

Cyber Security Review

News • Insights • Analysis

Primary Menu

Skip to content
  • About
    • Advanced Persistent Threat
    • Artificial Intelligence
    • Critical Infrastructure Protection
      • Aviation
      • Banking and Finance
      • Defence and Aerospace
      • Education and Academia
      • Energy
      • Government
      • Healthcare
      • Industrial Security
      • Telecommunications
      • Transportation
      • Utilities
    • Cybercrime
      • DDoS
    • Malware
    • Network Security
  • News
    • News – December 2025
    • News – November 2025
    • News – October 2025
    • News – September 2025
    • NEWS ARCHIVE
  • Articles
  • Events
  • Editorial
  • Subscribe
  • Advertise
Search

Credential Harvesting at Scale Without Malware

Posted onSeptember 30, 2021October 6, 2021AuthorCyber Security Review


While ransomware and ransomware-as-a-service (RaaS) attacks have dominated much of the cybersecurity community’s discussions over the past several months, criminals and hackers continue to compromise corporate, business and personal emails for financial gain. These scams, business email compromise (BEC) and personal email account compromise (EAC), continue to be the most pervasive and costly reported cyberthreats to users daily. In its latest annual report, the Federal Bureau of Investigation (FBI) identified that BEC and EAC accounted for at least $1.86 billion in losses within the U.S. in 2020, a 5% increase over losses reported in 2019. BEC and EAC accounted for 45% of all 2020 reported cybercrime losses in the U.S., and individuals over 60 years of age accounted for 11% of the reported victims.

Read more…
Source: Palo Alto/Unit 42


 

CategoriesNews September 2021TagsBusiness Email Compromise - BEC, Crime, Cybercrime, Email Account Compromise - EAC, Organised Crime, Threat Intelligence, TTPs

Post navigation

← Previous Previous post: DarkHalo after SolarWinds: the Tomiris connection
Next → Next post: Mac Users Targeted by Trojanized iTerm2 App

LATEST ARTICLES


A BEGINNER’S ROADMAP: HOW TO START YOUR AI SOC AGENT IMPLEMENTATION
By Kirsten Doyle
Cyber Security Review online – November 2025


THE PEOPLE BEHIND THE PIXELS: WHY CYBERSECURITY IN CRITICAL INDUSTRIES IS MORE HUMAN THAN EVER
Cyber Security Review online – July 2025


HOW TO MAXIMIZE EXCHANGE SERVER UPTIME? - SOME BEST PRACTICES
Cyber Security Review online – June 2025


KEY METRICS TO TRACK WHEN IMPLEMENTING AI IN YOUR SOC
By Josh Breaker-Rolfe
Cyber Security Review online – December 2024


ACHIEVING DATA SECURITY RESILIENCE WITH DSPM TOOLS
By Katrina Thompson
Cyber Security Review online – November 2024


CYBER SECURITY IN CRITICAL INDUSTRIES: CHALLENGES, SOLUTIONS, AND THE ROAD AHEAD
Cyber Security Review online – August 2024


HOW TO ENGAGE YOUR EMPLOYEES IN SECURITY AWARENESS TRAINING
Cyber Security Review online – April 2024


WHY IMMINENT SEC CYBER RULE CHANGES MEANS CYBER SECURITY LEADERSHIP MUST COME FROM THE VERY TOP
By Miguel Clarke, GRC and Cyber Security lead for Armor Defense
Cyber Security Review online – November 2023


WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?
By Ross Moore, Cyber Security Support Analyst with Passageways
Cyber Security Review online – October 2023

A BRIEF HISTORY OF DATA LOSS PREVENTION
Cyber Security Review online –  July 2023


THE 5 ESSENTIAL CYBERSECURITY AWARENESS TRAINING TIPS FOR A MORE SECURE ENVIRONMENT
Cyber Security Review online –  June 2023


THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023
Cyber Security Review online –  April 2023

THE NETWORK SECURITY CHALLENGE:
Improving Visibility to Defend Against Cyberthreats
By Kev Eley, Vice President Sales UK and Europe at LogRhythm

SWEDEN LAUNCHES EUROPE’S MOST ADVANCED HUB FOR AUTOMOTIVE CYBER SECURITY
Research Institute engages ethical hackers and the latest research in cyber technology to combat spiraling threats to connected vehicles  

Resources  |  Contact us  |  Advertise  |  User Login



Copyright © 2025 Cyber Security Review. All Rights Reserved. Privacy Policy
Catch Base by Catch Themes
Scroll Up
  • About
    • Advanced Persistent Threat
    • Artificial Intelligence
    • Critical Infrastructure Protection
      • Aviation
      • Banking and Finance
      • Defence and Aerospace
      • Education and Academia
      • Energy
      • Government
      • Healthcare
      • Industrial Security
      • Telecommunications
      • Transportation
      • Utilities
    • Cybercrime
      • DDoS
    • Malware
    • Network Security
  • News
    • News – December 2025
    • News – November 2025
    • News – October 2025
    • News – September 2025
    • NEWS ARCHIVE
  • Articles
  • Events
  • Editorial
  • Subscribe
  • Advertise