Professional Documents
Culture Documents
Matched Assets :
EMAIL : biju.ambrish@gmail.com
Description
Credentials refer to the specific data used for verification of identity or tools for
Impact
1) The credential holder could use the details for personal profit, release them publically
or sell them on dark web platforms.
2) Use the compromised account for sending out spam mail.
3) Cybercriminals can move laterally, placing backdoors, RATs and other software to
become persistent, exfiltrate the data of employees or customers.
Remediation
1) Inform the end user to change the password and alert about disclosure.
2) In case of privileged account revoke the access to avoid further damage
3) Initiate heightened monitoring for compromised credentials.
4) Inform end users not to use official email id in third-party websites.
5) Monitor recent and future actions performed by leaked credentials for mysterious
activities.
6) Warn users against password reuse.
For multiple credential breach or post containing only the clients' account
Precautions
Screenshots