meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

Leveling up their credential phishing tactics. [Research Saturday]

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.6 • 1K Ratings

šŸ—“ļø 17 May 2025

ā±ļø 18 minutes

šŸ§¾ļø Download transcript

Summary

This week, Dave speaks with Max Gannon of Cofense Intelligence to dive into his team's research on "The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders." Threat actors continuously develop new tactics, techniques, and procedures (TTPs) to bypass existing defenses. When defenders identify these methods and implement countermeasures, attackers adapt or create more sophisticated approaches. This research explores how cybercriminals are leveling up their credential phishing tactics using Precision-Validated Phishing, a technique that leverages real-time email validation to ensure only high-value targets receive the phishing attempt. The research can be found here: The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders⁠⁠⁠⁠⁠ Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:10.2

What's the common denominator in security incidents?

0:16.4

Escalations and lateral movement.

0:18.9

When a privileged account is compromised, attackers can seize control of

0:22.9

critical assets. With bad directory hygiene and years of technical debt, identity attack paths are

0:29.6

easy targets for threat actors to exploit, but hard for defenders to detect. This poses risk

0:35.6

in active directory, intra- ID, and hybrid configurations.

0:40.1

Identity leaders are reducing such risks with attack path management.

0:44.7

You can learn how attack path management is connecting identity and security teams

0:49.1

while reducing risk with Bloodhound Enterprise, powered by SpectorOps.

0:54.8

Head to SpectorOps.io today to learn more.

0:58.9

SpectorOps, see your attack paths the way adversaries do.

1:20.3

Thank you. They're not using any sort of really advanced techniques.

1:25.5

They're using pretty simple stuff, but they're using it in a different way.

1:30.4

And by using it this way, they show that they have an understanding of how soft work,

1:33.4

which is something that a lot of directors don't.

1:44.3

That's Max Gannon, intelligence Manager with CoFence Intelligence.

1:47.0

The research we're discussing today is titled,

1:52.2

The Rise of Precision Validated Credential Thft, a New Challenge for Defenders.

2:04.6

My team has what we call qualitative groups, And when we find some kind of interesting behavior, we tag it with a group. And a lot of times, we'll only see it once or twice. So it's

2:09.5

not really worth writing about it just yet. But when we've seen enough of this qualitative group,

2:14.3

especially if it suddenly starts to become more common, then we'll really do an in-depth dive on it and start writing about it.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright Ā© Tapesearch 2025.