Blog
Inside a Compromised Account: How Cybercriminals Use Credential Phishing to Further BEC Scams
Mon, 06/07/2021
Why would a cybercriminal spend time developing malware when he can simply trick unsuspecting users into handing over their passwords? Why would a threat actor spend her money and resources on ransomware, when she can get that same information through a compromised account? It’s a good question, and exactly what the Agari Cyber Intelligence Division wanted to discover.
In a growing trend known as...