Skip to content
Up To Date Time

Up To Date Time

  • Home
  • Sports
  • cryptocurrency
  • Technology
  • Virtual Reality
  • Education Law
  • More
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
  • Toggle search form
New Report Reveals How Long Hackers Keep Using Compromised Accounts

New Report Reveals How Long Hackers Keep Using Compromised Accounts

Posted on May 7, 2025 By rehan.rafique No Comments on New Report Reveals How Long Hackers Keep Using Compromised Accounts












Security firm Barracuda Networks and UC Berkeley have jointly researched cybercriminals’ behavior once they take over accounts, specifically focusing on the end-to-end lifecycle of a breached account.

The parties investigated 159 compromised accounts across 111 organizations in a bid to find out how threat actors take over accounts, how long attackers remain in compromised accounts, and how they use and extract information from these accounts.

Dwelling in the Account for Weeks or Even Months

According to a report published on July 23, some bad actors remain in compromised accounts for weeks or even months, with 33% of attackers dwelling in the account for over a week.

The report’s findings indicate the following:

  • Nearly 80% of threat actors did not access any applications outside of email,
  • 20% of breached accounts appear in at least one online password data breach,
  • 31% of compromises reflect an increasingly specialized market for account compromise.

To get access to email accounts and steal credentials, hackers opt for brand impersonation and phishing. The report further explains:

“Once the account is compromised, hackers monitor and track activity to learn how the company does business, the email signatures they use, and the way financial transactions are handled, so they can launch subsequent phishing attacks, including harvesting financial information and additional login credentials for other accounts.”

Sometimes hackers reportedly sell stolen login credentials to other threat actors, and thus a different attacker continues using the compromised account mining for information and extracting value from it.

Focus on Corporate Networks

The researchers discovered that in 98% of breached accounts, hackers accessed at least one email-related Office 365 app, including Microsoft Outlook. This reportedly enabled them to obtain access to contact lists and relate that data with any confidential and financial information of the employee and the organization.

As previously reported by forklog.media, hackers seem to have shifted their focus from individual servers to corporate networks. In the second half of 2019, the number of postings on illicit marketplaces offering access to corporate networks reportedly began surging.

Follow us on Twitter and Facebook and join our Telegram channel to know what’s up with crypto and why it’s important.

Subscribe to our Newsletter


<

cryptocurrency

Post navigation

Previous Post: An update on me, my blog, my trips to China and the US
Next Post: Top 101 Technology Facts to know

More Related Articles

Teucrium XRP ETF sees M volume, outpaces leveraged Solana ETF Teucrium XRP ETF sees $5M volume, outpaces leveraged Solana ETF cryptocurrency
The Game-Changer for Web3 Data by The Graph The Game-Changer for Web3 Data by The Graph cryptocurrency
XRP price prediction for April shows 70% rally possible from .79 wick XRP price prediction for April shows 70% rally possible from $1.79 wick cryptocurrency
Monetran Seeks Ecommerce Sites Built with WooCommerce Plugin Monetran Seeks Ecommerce Sites Built with WooCommerce Plugin cryptocurrency
0 Mil In Crypto Longs Gone As Bitcoin Crashes Under k $500 Mil In Crypto Longs Gone As Bitcoin Crashes Under $80k cryptocurrency
Make CPU Mining Great Again — Official MinerGate Blog Make CPU Mining Great Again — Official MinerGate Blog cryptocurrency

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • What Are Crypto Alerts and How to Get Them on Binance, Coinbase, Robinhood, and Coinwink
  • An insightful interview with the Animal Company team
  • Aqara Video Doorbell G4 review: fast notifications, needs more height
  • Matt Shaw should take this shocking Cubs trade rumor personally
  • Astell&Kern and 64 Audio Launch XIO In-Ear Monitors — First Listen at CanJam London 2025?

Categories

  • cryptocurrency
  • Education Law
  • Sports
  • Technology
  • Virtual Reality

Copyright © 2025 Up To Date Time.

Powered by PressBook Blog WordPress theme