Using active defense techniques, Agari planted credentials into more than 8,000 phishing sites impersonating enterprise applications, then monitored these accounts to see when and how each compromised account was accessed. Through our analysis, we gained unique insights into what cybercriminals do with compromised email accounts.
Watch this webinar to hear answers to important questions about the lifecycle of a phishing attack, including:
- How quickly are compromised accounts accessed?
- How are compromised accounts accessed?
- Where are the actors using compromised credentials located?
- What do cybercriminals do with the compromised accounts?
Want to learn more now? Download the threat intelligence brief on the Anatomy of a Compromised Account for an overview of the research.