Tag

Credential Theft

Posts exploring how attackers steal usernames, passwords, and authentication tokens through phishing, keylogging, brute force attacks, and credential stuffing. Includes actionable guidance on multi-factor authentication, password managers, and monitoring for compromised credentials.

posts

PayPal DocuSign Phishing

PayPal DocuSign Phishing: How to Spot This Attack

Last month, a finance manager at a mid-sized logistics company received what looked like a routine DocuSign envelope — a payment authorization supposedly routed through PayPal. She clicked, entered her PayPal credentials on a pixel-perfect fake login page, and within 90 minutes, the attacker had initiated $38,000 in wire transfers.

Carl B. Johnson Jul 29, 2021 7 min read
Phishing Attack

Phishing Attack Anatomy: How Breaches Actually Start

In May 2021, a single phishing attack against Colonial Pipeline's legacy VPN account triggered the largest fuel supply disruption in U.S. history. One compromised credential. No multi-factor authentication. Five days of chaos across the Eastern Seaboard. That's what a phishing attack looks like when it

Carl B. Johnson Jul 13, 2021 7 min read
Phishing News

Phishing News: The Attacks Dominating 2021 So Far

2021's Phishing Landscape Is Unlike Anything We've Seen Before In March, Microsoft reported that a massive phishing campaign had targeted over 10,000 organizations since January 2021, using sophisticated OAuth token theft to bypass multi-factor authentication. That single campaign should have been a wake-up call. Instead,

Carl B. Johnson Jul 13, 2021 7 min read
Phishing Scams

Phishing Scams: What's Actually Working in 2021

The FBI's Internet Crime Complaint Center reported $4.2 billion in losses from cybercrime in 2020 — and phishing scams were the number one reported attack type, with 241,342 complaints. That's not a typo. Nearly a quarter of a million people filed formal complaints about phishing

Carl B. Johnson Jul 13, 2021 7 min read
Spear Phishing

What Is Spear Phishing? The Targeted Attack Behind Major Breaches

In December 2020, the world learned that SolarWinds — a company whose software sat inside thousands of government and corporate networks — had been compromised by a sophisticated nation-state threat actor. The initial intrusion vector? Targeted, carefully crafted communications designed to exploit trust. If you're asking what is spear phishing,

Carl B. Johnson Jul 01, 2021 8 min read
Phishing

Define Phishing: What It Really Looks Like in 2021

In March 2021, a single phishing email led to the compromise of over 30,000 U.S. organizations through the Microsoft Exchange Server vulnerabilities. The attackers didn't need a sophisticated zero-day to get their initial foothold — they needed someone to click. If you're trying to define

Carl B. Johnson Jul 01, 2021 7 min read
Fake Mailer

Fake Mailer Attacks: How Threat Actors Spoof Emails

In March 2021, the FBI's Internet Crime Complaint Center reported that business email compromise — often launched using a fake mailer or spoofing tool — cost American organizations over $1.8 billion in 2020 alone. That made it the most financially damaging cybercrime category in the entire IC3 report, dwarfing

Carl B. Johnson Jul 01, 2021 7 min read
Web Security Best Practices

Web Security Best Practices: 12 Steps That Actually Work

In March 2021, a single misconfigured web server at a major airline exposed 4.2 million passenger records. Names, email addresses, passport numbers — all sitting in an unprotected cloud bucket. The fix would have taken about fifteen minutes. The breach response cost millions and took months. That's the

Carl B. Johnson Jun 01, 2021 6 min read
Cloud Computing Security

Cloud Computing Security: What Goes Wrong in Practice

Capital One Lost 100 Million Records Because of One Misconfigured Firewall In 2019, a former cloud services employee exploited a misconfigured web application firewall to steal the personal data of over 100 million Capital One customers and applicants. The breach cost Capital One over $80 million in fines from the

Carl B. Johnson May 18, 2021 6 min read
Phishing Emails

How Phishing Emails Work: The Psychology Behind the Click

A Pipeline Went Dark — Because One Person Clicked On May 7, 2021, Colonial Pipeline — the largest fuel pipeline in the United States — shut down operations after a ransomware attack. The disruption caused fuel shortages across the southeastern U.S. and triggered panic buying. While the full forensic details are still

Carl B. Johnson May 13, 2021 7 min read