Skip to content
Saturday, May 16, 2026
The TechBriefs
  • Home
  • Technology
  • AI
  • Computers
  • Security
  • Internet
  • Press Releases
    • GlobeNewswire
    • PRNewswire
  • Contact

Attackers don’t break in anymore, they log in instead

attackers-don’t-break-in-anymore,-they-log-in-instead
Attackers don’t break in anymore, they log in instead
Credentials login

A new report finds that attackers increasingly rely on compromised credentials, identity abuse, and trusted integrations rather than traditional malware-driven intrusion techniques.

The study from Ontinue draws on investigations conducted by its Advanced Threat Operations (ATO) team and telemetry from the Ontinue ION MXDR platform, it highlights how identity compromise has become the most common pathway into cloud environments.

“Attackers aren’t trying to break through defenses anymore, they’re logging in with stolen credentials,” says Balazs Greksza, director of Advanced Threat Operations at Ontinue. “Infostealers are feeding a growing underground market for corporate access. Once attackers obtain valid identities, they can bypass traditional security controls and move through environments as legitimate users, often without triggering the alarms organizations rely on.”

Identity-based attacks now dominate security investigations. Rather than exploiting software vulnerabilities, attackers increasingly rely on compromised credentials to gain direct access to cloud environments.

Infostealer malware plays a central role in this trend. Malware families such as LummaC2 harvest browser passwords, session cookies, and authentication tokens from infected systems. These stolen credentials are then packaged into ‘logs’ and sold through dark web marketplaces, allowing other threat actors to purchase ready-made access to corporate environments. Listings of stolen credentials linked to LummaC2 have increased by 72 percent on underground marketplaces.

The report also cites more than 7,000 ransomware incidents reported globally in 2025, with over 120 active ransomware groups operating across industries.

In addition there are signs that threat actors are beginning to use generative AI to accelerate the development of malicious tools. Analysis of several recovered webshells and commodity malware samples has revealed coding patterns consistent with LLM-assisted development.

Shane Barney, chief information security officer at Keeper Security, says, “As the Ontinue report notes, identity has become the attacker’s skeleton key. Instead of forcing their way through a firewall, adversaries are logging in with stolen credentials, hijacked tokens and abused permissions, then moving laterally under the cover of legitimacy. When identity controls are fragmented or overly permissive, attackers don’t need novel exploits. They just need access that looks routine. Identity now defines the enterprise perimeter. When every identity is governed with least privilege and continuously validated, a stolen credential becomes a contained event instead of an enterprise-wide incident.”

You can read more and get the full report on the Ontinue blog.

Image credit: Tsingha25/Dreamstime.com

Posted in Article, credential theft, cyberattacks, cybersecurity, Identity, Technology, user loginTagged Article, credential theft, cyberattacks, cybersecurity, Identity, user login

Post navigation

Previous: 7 settings to change on your new MacBook Neo that will get it up and running in record time
Next: Applied Intuition y LG Innotek firman una alianza para impulsar el desarrollo de vehículos autónomos

Related Posts

94-percent-of-it-leaders-worry-about-vendor-lock-in
  • Article
  • Artificial Intelligence (AI)
  • Cloud
  • Cloud vendors
  • costs
  • Technology

94 percent of IT leaders worry about vendor lock-in

  • Admin
  • February 17, 2026
  • 0

A new survey from virtualization and end-user computing (EUC) solutions company Parallels finds 94 percent of organizations are concerned about […]

organizations-struggle-to-manage-ai-and-saas-use-safely
  • Article
  • Artificial Intelligence (AI)
  • cybersecurity
  • SaaS
  • Shadow IT
  • Single Sign-On
  • Technology

Organizations struggle to manage AI and SaaS use safely

  • Admin
  • October 30, 2025
  • 0

A new report finds that while 73 percent of employees are encouraged to use AI 33 percent don’t always follow […]

windows-20-is-the-upgrade-windows-11-should-have-been-—-download-it-now
  • Article
  • Microsoft
  • Technology
  • Uncategorized
  • Windows 10
  • Windows 11
  • Windows 20

Windows 20 is the upgrade Windows 11 should have been — download it now

  • Admin
  • March 5, 2025
  • 0

With Windows 11, Microsoft tried to make the new OS look different from Windows 10, mainly by centering the taskbar […]

  • Privacy Policy
  • Terms of use
Theme: Terminal News By Adore Themes.