infographic: 3 ways to steal corporate credentials

1
3 Ways to Steal Corporate CREDENTIALS an IBM Company Cybercriminals use malware like Remote Access Trojans (RATs) and key-loggers to capture sensitive data, including corporate credentials, from victims' devices. Cybercriminals create phishing sites, which are malicious web pages that look identical to legitimate sites, to trick employees into giving up their corporate credentials. Credentials submitted to a phishing site are sent straight to the criminal. Cybercriminals attack public sites, such as social and eCommerce sites, because they know users tend to re-use their corporate credentials. When a public site's user database is breached, corporate credentials can be exposed. Malware: RATs, Key-loggers & More Phishing Sites ****** Password Re-use of Corporate Credentials on Public Sites ****** www. Trusteer Apex protects corporate credentials from advanced information-stealing malware, data exfiltration, and sophisticated cyberattacks. When Trusteer Apex is installed on an employee endpoint, sensitive business information stays safe. Docs Docs INFILTRATED ****** Password: Criminal Access

Upload: ibm-security-systems

Post on 15-Jan-2015

631 views

Category:

Technology


0 download

DESCRIPTION

Learn more: http://securityintelligence.com/3-ways-steal-corporate-credentials/ Cybercriminals are always on the hunt for user credentials (user name and password). If you have someone’s credentials, you can log into their systems, access valuable data, and perform fraudulent transactions on their behalf. Credentials are typically extracted by cybercriminals in one of three ways.

TRANSCRIPT

Page 1: INFOGRAPHIC: 3 Ways to Steal Corporate Credentials

3 Ways to Steal Corporate

CREDENTIALS

an IBM Company

Cybercriminals use malware like Remote Access Trojans (RATs) and key-loggers to capture sensitive data, including corporate credentials, from victims' devices.

Cybercriminals create phishing sites, which are malicious web pages that look identical to legitimate sites, to trick employees into giving up their corporate credentials. Credentials submitted to a phishing site are sent straight to the criminal.

Cybercriminals attack public sites, such as social and eCommerce sites, because they know users tend to re-use their corporate credentials. When a public site's user database is breached, corporate credentials can be exposed.

Malware:RATs, Key-loggers

& MorePhishing

Sites

* * * * * *Password

Re-use of Corporate Credentials

on Public Sites

* * * * * *

www.

Trusteer Apex protects corporate credentials from advanced information-stealing malware, data ex�ltration, and sophisticated cyberattacks. When Trusteer Apex is installed on an employee endpoint, sensitive business information stays safe.

Docs

Docs

INFILTRATED

* * * * * *Password:

Criminal Access