Attack methods repeat themselves, and so does how cybercriminals use breached data, such as PII, stolen account details and even compromised admin credentials. Once data is compromised, it can circulate and recirculate on the dark web for years, and be packaged and repackaged for crime, cyberespionage and fraud. Understanding how breached data is used, whether it be to create synthetic identities, take over bank accounts or perpetrate credit card fraud, to name a few, can play a big role in threat-intelligence, too.
- Understand how the use of breached data can support threat intelligence
- Review breached data that attackers may use again
- Discuss common TTPs that attackers use when repurposing breached data for new attacks
|Harrison Van Riper
Strategy and Research Analyst
|Product Marketing Manager|
|Digital Shadows||Digital Shadows|