Kasey Cromer, Netlok | October 6, 2025
Executive Summary
2025 is setting new records for cyberattacks, with over 16 billion passwords exposed and more than half of data breaches involving personally identifiable information (PII). Given increased regulatory scrutiny, increasing penalties, customer-facing risks, combined with new methods to protect yourself, every digital service user should take proactive steps to protect themselves.[1][2][3]
1. Data Breach by the Numbers
Defining Personally identifiable information (PII): PII is any type of data that can be used to distinguish or trace an individual’s identity by itself or when combined with other information. This includes direct identifiers—like full names, Social Security numbers, passport information, or biometric data (e.g., fingerprints, facial scans), and indirect ones—such as date of birth, race, gender, or place of birth that when combined with other data, can reveal the identity of a person.[4][5][6] Sensitive PII includes information like financial details, medical records, driver license numbers, phone numbers and email addresses, making this data highly valuable to cybercriminals. Protecting PII is crucial to prevent identity theft and unauthorized use.
| Metrics for 2024 | Value | Source |
| Passwords exposed | 16 billion | [1] |
| Global cost per breach | $4.88M | [2] |
| U.S. cost per breach | $9.36M | [7] |
| Breaches exposing PII | 53% | [3] |
| Average cost per PII record | $173-$189 | [3] |
| Regulatory fines (32% of orgs) | $100,000+ | [8] |
| Breach Volume Trends 2021-2025 |
| Data Breaches by Year: |
| 2021: ████████████ 1,100 |
| 2022: ██████████████ 1,400 |
| 2023: ████████████████ 1,700 |
| 2024: █████████████████████ 2,100 |
| 2025 YTD: █████████████████████████ 2,500 |
2. Who Gets Hurt—and How?
Victims of recent breaches recount losing retirement savings, having mortgage applications denied, and enduring relentless phishing and fraud attacks. A Connecticut bank customer saw their information used to open credit cards. Another family faced insurance fraud after health data was leaked. The takeaway, even when attackers don’t steal money immediately, is that exposed personal information often causes financial, emotional, and reputational turmoil for years.[9][10]
“The shift we’re seeing in 2025 is from passive acceptance of breaches to active customer empowerment. New regulations, better insurance options, and innovative authentication technologies are giving consumers real tools to protect themselves—but only if they use them.”
— Industry perspective from leading cybersecurity analysts[2][3]
3. Salesforce as Case Study—But Risks Are Everywhere
The high-profile Salesforce breach, in 2025, impacted thousands of organizations, exposing credentials and customer data through a third-party integration. Yet these methods—phishing, stolen PII, exploiting software integrations—also enable attacks on hospitals, insurers, banks, universities, and government offices across the globe. Every digital user is potentially a target.[11][12][13]
| Attack Vectors by Industry (2025) |
| Industry Breakdown of Data Breaches: |
| Healthcare 35% ███████████████████████████████████ |
| Financial 28% ████████████████████████████ |
| Retail/E-comm 22% ██████████████████████ |
| Government 10% ██████████ |
| Other 5% █████ |
4. Regulation & Insurance: What Changed in 2025
Regulatory Breach Notice Deadlines—At a Glance
| State/Regulation | Deadline |
| NY, CA | Immediate |
| Oklahoma | 48 hours |
| HIPAA (all U.S. healthcare) | Up to 60 days |
5. Emotional & Financial Toll: Human Stories Matter
Exposed PII allows cybercriminals to send customized scam emails, create socially engineered support lines, and commit medical or financial fraud in victims’ names. Victims often spend months, sometimes years, repairing records, refuting fraudulent activity, and regaining lost access. For most simple cases, recovery is possible within weeks to a few months, but for a substantial minority, especially those involving government fraud or major financial harm, the process can extend for 1-2 years or longer. [18]
| Average Recovery Timeline After Breach |
| Timeline to Full Recovery: |
| Day 0 ▓ Breach Detection |
| Days 1-7 ▓▓▓ Notification Period |
| Days 7-30 ▓▓▓▓▓▓▓ Account Security Measures |
| Days 30-90 ▓▓▓▓▓▓▓▓▓▓▓▓▓ Credit Monitoring Setup |
| Months 3-24 ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓ Full Recovery Process |
6. What Every Customer Should Do
Within 24 hours of breach notice:
Within 48 hours:
Week 1:
First month:
Ongoing:
7. Why Passwords Are the Problem—and Photolok Is the Solution
Traditional passwords remain the weakest link in cybersecurity, with 88% of web application attacks exploiting stolen credentials.[3] That’s why at Netlok, we’ve developed Photolok—a revolutionary visual authentication system that eliminates passwords entirely.
How Photolok Protects You:
Visual Authentication
Instead of typing passwords that can be stolen, you select encrypted photos from Photolok’s proprietary library and log in to your private account. Hackers can’t use what they can’t steal.
One-Time Use Photos
Each photo can be set for single use, expiring after login. Even if someone sees you authenticate, they can’t reuse that image.
Duress Protection
Select a special “duress photo” to silently alert authorities or trusted contacts if you’re forced to log in under threat—a feature no password can offer.
Easy Setup & Management
Built for Everyone
From tech-savvy professionals to seniors who struggle with passwords, Photolok’s intuitive design makes strong security accessible to all users.
Real-World Impact:
When the recent Salesforce breaches exposed consumer passwords, Photolok users remained protected. You can’t phish a photo that changes with each login.
Ready to move beyond passwords? Learn more about Photolok or Request a Demo to see how visual authentication can protect your accounts today.
8. The Path Forward
Data breaches aren’t slowing down—they’re accelerating. But customers don’t have to be victims. Through vigilance, advocacy, and adoption of advanced authentication solutions like Photolok, every user can take control of their digital security.
Author & Credentials
Kasey Cromer is Director of Customer Experience at Netlok, focused on authentication, incident response, and SaaS security for over a decade.
Resources
Published September 2025. Content reviewed quarterly for accuracy and compliance. Netlok’s Photolok solution is featured as an innovative approach to password-free authentication in the evolving cybersecurity landscape.
K. Cromer, Netlok 9/8/2025
This analysis builds on Netlok’s ongoing research into wrench attack vulnerabilities. For additional context, visit our blog resources.
The darkest prediction in cryptocurrency security has come true: As of August 2025, wrench attacks against crypto holders are averaging more than one incident per week worldwide, with 30+ documented cases in less than half a year¹. Bitcoin trades near $122,000—over 50% higher than a year ago—fueling a shift from sophisticated hacking to old-fashioned violence².
As crypto values hit historic highs and identities are exposed via massive data breaches, security experts warn of “a brutal convergence of the speed of cybercrime with the violence of street crime”³. Recent statistics confirm this threat has evolved from isolated events to systematic targeting, making distress resistant authentication more critical than ever.
The Numbers Tell a Chilling Story
| Threat Factor | Before 2025 | 2025+ Reality |
| Attack Frequency | 18 cases (2023), 24 cases (2024) | 30+ cases in less than half a year¹ |
| Geographic Spread | Mostly isolated in the US | Global: France, U.S., UK, Canada, Asia⁴ |
| Target Sophistication | Crypto-savvy users with strong digital security | Advanced users with cold wallets are equally vulnerable |
| Criminal Methods | Opportunistic robberies | Organized kidnappings, family targeting, weeks-long captivity⁵ |
| Price Correlation | Wrench attacks did not reliably increase with rising Bitcoin prices | Direct link to Bitcoin’s $122,000 highs² |
| Insurance Response | No specialized policies | Lloyd’s of London now offering wrench attack coverage⁶ |
Why Paris Became Ground Zero
France, particularly Paris, has emerged as the epicenter of crypto violence. In one prominent case, a crypto executive was kidnapped from his home, while others saw family members targeted in broad daylight⁷. Cases aren’t limited to continental Europe: the U.S., UK, Canada, and Asia have all reported wrench attacks in 2025⁴.
What began as isolated cases is now a global issue, with organized crime groups and opportunistic actors exploiting public profiles and personal data⁸.
Where Traditional Security Fails
“The brutal reality is that seemingly cryptographically perfect systems fail completely when someone puts a gun to your head”⁹.
Traditional multi-factor authentication, hardware wallets, and encryption offer no real protection against physical coercion.
Victims report beatings, electric shocks, and even prolonged captivity until attackers achieved transfers under force¹⁰. Research now shows that even highly security-conscious holders are not immune—meaning the threat transcends technical skill or digital hygiene¹¹.
This widening gap between digital protections and physical coercion is precisely where an alternative approach is needed.
The Photolok Advantage
Unlike traditional MFA methods that collapse under physical threats, Photolok introduces adaptive, attack response visual authentication designed to transform wrench attacks from complete vulnerability into opportunities for silent resistance¹².
Duress Signaling in Action
Consider a scenario: a user pre-selects a specific photo as a “duress” photo. If forced to authenticate, selecting this photo triggers a silent alarm to security contacts and law enforcement, while granting access to the attacker. This ensures that, even during a threat, victims can discreetly signal for help without escalating the situation¹³.
One-Time Use
Each photo is cryptographically unique. By selecting a one-time use photo, you avoid photo disclosure as a one-time photo expires after it is used one time. Even if attackers gain access, this specific photo cannot be reused—significantly limiting the attacker’s ability to login in the future¹³.
Cognitive Confusion
Photolok’s visual, point-and-click system is unfamiliar to most criminals who expect passwords or PINs. Attackers may struggle to articulate demands (“click on your photos” is less intuitive than “enter your password”), creating crucial delays and confusion¹².
Risk Reduction Tools
There are a number of actions that can be taken to reduce the risk of attack and minimize harmful outcomes.
From Vulnerability to Empowerment
2025’s weekly attack frequency marks a turning point in crypto security. For the first time, tools exist that change the outcomes of physical coercion, enabling individuals to silently signal for help and limit attackers’ ability to access their personal information under duress. With Photolok’s duress photo login, if someone forces a user to unlock crypto, selecting a special “duress photo” quietly alerts help without tipping off the attacker. Instead of feeling powerless, users get a way to protect their assets and ask for help, even in dangerous situations. The $5 wrench and threat of physical harm will always defeat pure encryption, but it doesn’t have to defeat human ingenuity.
Ready to enhance your security? Learn more about how Photolok can protect your assets at Netlok.com and explore our blog resources for deeper insights into duress-resistant authentication and the future of crypto security.
Sources
A.R. Perez, Netlok. 7/8/2025
Multi-factor authentication (MFA) was once hailed as a near-perfect shield, yet recent headline breaches prove attackers are not only slipping past it—they are doing so at an accelerating pace. This report ranks today’s most common MFA combinations from weakest to strongest and quantifies the sharp rise in MFA-related attacks between 2023 and 2025. It should be noted that PhotolokÒ (a passwordless MFA factor that uses proprietary-coded photos) is not included in this analysis.
Why MFA Strength Varies
Every MFA scheme marries at least two factors—knowledge (password/PIN), possession (token/phone), or inherence (biometric). Security depends on:
Ranking MFA Combinations
| Rank | Typical Combination | Core Weaknesses | Core Strengths | Verdict |
| 8 (Strongest) | Hardware passkey + on-device biometric (FIDO2/WebAuthn) | None of the factor data ever leaves the device; resistant to phishing and replay 1, 2 | Cryptographic challenge tied to hardware; biometric unlock 3 4 | Phishing-resistant, passwordless gold standard |
| 7 | Password + hardware security key (FIDO2/U2F) | Requires user to manage key inventory | Cryptographic possession factor blocks replay 5, 1 | Best “password-plus” model |
| 6 | Password + smart-card/PKI token (PIV/CAC) | Complex deployment & driver issues | Mutual certificate validation; device binding 2 | Enterprise-grade where supported |
| 5 | Password + platform biometric (e.g., Windows Hello, Face ID) | Biometric unlock is local; underlying session can be phished if fallback to password allowed 4 | User-friendly; device-tied secrets6 | Good for mainstream use but still password-dependent |
| 4 | Password + number-matching push or TOTP-hardware token | Phishable one-time codes; token theft possible7, 8 | Short validity window, no SMS channel | Mid-level protection |
| 3 | Password + generic authenticator-app TOTP (30-second code) | Real-time phishing proxies capture code 9 | No carrier reliance; easy rollout 7 | Better than SMS, still phishable |
| 2 | Password + push notification (“Approve/Deny”) | MFA-fatigue bombing & social-engineering approvals10, 11 | User convenience | Frequently bypassed by prompt bombing |
| 1 (Weakest) | Password + SMS/voice code | SIM-swap, SS7 intercept, no encryption 12, 13 | Universal availability | Should be phased out per CISA and NIST guidance 2, 14 |
Key Takeaways
The Surge in MFA-Focused Attacks (2023-2025)
| Year | Representative Study | Metric Reported | Indicator of MFA Attack Activity |
| 2023 | Okta “State of Secure Identity 2023” | 12.7% of all MFA attempts on Okta’s Customer Identity Cloud were outright bypass attacks 15 | Baseline showing bypass in production traffic |
| 2023 | Kroll “Rise in MFA Bypass” (Oct 2023) | 90% of BEC cases investigated had MFA in place when accounts were compromised 16 | Confirms attackers pivoting to MFA-enabled targets |
| 2024 | Cisco Talos IR Q1 2024 | ≈50% of incident-response cases involved failure or bypass of MFA controls 10, 17 | Doubling of bypass prevalence over 2023 baseline |
| 2024 | Proofpoint “State of the Phish 2024” | Phishing frameworks such as EvilProxy observed in ≈1 million threats per month, explicitly harvesting MFA cookies 18 | Commodity kits fueling large-scale bypass |
| 2025 | Netrix Global “New Wave of MFA Bypass Attacks” (Jun 2025) | Advises a “surge” but no percentage; corroborated by FRSecure IR 2024-25 where 79% of BEC victims had correctly implemented MFA yet were breached 19 | MFA bypass now dominant in BEC incidents |
| 2025 | eSentire Q1 2025 Report | BEC attacks (often MFA bypass via Tycoon 2FA) rose 60% YoY, now 41% of all attacks 20 | Attack volume and proportion at all-time high |
Visualizing the Climb
| Year | Reported MFA-Attack Rate* | Year-over-Year Change |
| 2023 | 12.7%–-90% depending on vertical (baseline) | — |
| 2024 | ≈50% of IR cases involve MFA bypass 10, 17 | +~35 pp from Okta baseline |
| 79% of BEC victims breached despite MFA 19 | +29 pp vs 2024 IR data |
*Rates come from different datasets (CIAM traffic, IR engagements, BEC breaches). While scopes vary, all show the same climbing trajectory.
Why the Rate Keeps Rising
Commodity Phishing-as-a-Service (PhaaS)
Token Theft & Session Hijacking
MFA Fatigue & Social Engineering
Weak Factor Mix
Hardening the Human-Machine Perimeter
1. Phase Out Legacy Factors
2. Enforce Phishing-Resistant MFA
3. Strengthen Push Workflows
4. Layer Conditional Access & Risk-Based Controls
5. Educate to Eradicate MFA Fatigue
Conclusion
Attackers’ ability to sidestep MFA has grown from isolated exploits in 2023 to industrial-scale commodity services in 2025. Organizations that cling to password-plus-SMS or push-only MFA now occupy the bottom rung of the strength ladder and face a sharply rising threat curve. Yet the solution is within reach: broad adoption of phishing-resistant, device-bound authentication—coupled with risk-aware access controls—flips the cost curve back onto the attacker. Upgrade the factors, shrink the attack surface, and keep users from approving the next rogue prompt. One novel method of upgrading factors is to use Photolok – a passwordless factor that uses steganographic coded photos that also protects against AI/ML attacks as well as provides lateral movement penetrations due to its unique architecture.
A.R. Perez, Netlok, July 1,2025
Understanding the Threat Landscape
The emergence of sophisticated deepfake technologies and synthetic identity creation tools represents one of the most significant challenges facing biometric authentication systems today. Deepfakes are highly realistic, artificially generated media that can convincingly replicate human faces, voices, and behaviors using advanced deep learning techniques 1, 2. These technologies have rapidly evolved from entertainment applications to become serious security threats, with attackers now capable of bypassing traditional biometric systems that once seemed unbreachable.
Recent data reveals the scale of this challenge: in 2024, 50% of surveyed businesses reported experiencing deepfake-related attacks, with 57% of cryptocurrency organizations facing audio deepfake fraud 3. The accessibility of AI tools has democratized deepfake creation, allowing even non-technical attackers to generate convincing synthetic media with minimal coding skills 4. Reports indicate a staggering 704% increase in face swap attacks across 2023, demonstrating the exponential growth of this threat vector 4.
Vulnerabilities in Current Biometric Systems
Traditional biometric authentication systems face significant vulnerabilities when confronted with sophisticated synthetic attacks. Research conducted at Penn State found that four of the most common facial liveness verification methods currently in use could be easily bypassed using deepfakes 5. The study developed a framework called “LiveBugger” which demonstrated that facial liveness verification features on various apps could be fooled by deepfake images and videos.
The fundamental challenge lies in the fact that conventional biometric systems were designed to distinguish between live humans and simple presentation attacks (like printed photos or basic recordings), but they struggle against AI-generated content that can mimic the subtle characteristics of live biometric samples 6, 7. Facial recognition systems, which rely on static features and patterns, are particularly vulnerable to sophisticated deepfake attacks that can replicate facial landmarks, expressions, and even micro-movements 8.
Voice biometric systems face similar challenges, with AI voice synthesis now capable of replicating vocal patterns, pitch, and tone with unsettling accuracy 8. Attackers can create voice clones using just a few seconds of recorded audio, enabling them to bypass voice-based authentication systems that were previously considered secure.
Impact on Authentication Confidence
The proliferation of deepfakes has begun to erode confidence in biometric authentication systems. Gartner analysts predict that by 2026, 30% of companies will lose confidence in facial biometric authentication due to the sophistication of AI deepfakes 1. This loss of confidence is not unfounded – traditional verification methods, including basic selfie comparisons and document-based biometric checks, are increasingly ineffective against realistic fake images, videos, and voices generated by accessible AI tools 3.
The problem extends beyond simple spoofing attacks. Fraudsters can now create entirely new synthetic identities that appear legitimate, utilizing generative AI models to produce hyper-realistic identification documents and deepfake videos capable of evading traditional liveness detection mechanisms 3. This capability allows attackers to circumvent Know Your Customer (KYC) checks employed by financial services, creating fraudulent accounts and executing unauthorized transactions.
Emerging Countermeasures and Technologies
The biometric industry is responding to these challenges through several innovative approaches designed to detect and prevent deepfake attacks:
Advanced Liveness Detection
Modern liveness detection technologies have evolved far beyond simple movement or challenge-response mechanisms. Companies like Mitek have developed sophisticated systems that can detect deepfakes and synthetic attacks through consistency analysis between different biometric modalities 9. Their IDLive® Face product has achieved recognition as a top performer in NIST facial presentation attack detection evaluations and demonstrates effectiveness against sophisticated fraud attempts 9.
Next-generation liveness detection systems incorporate passive analysis that can identify subtle artifacts and inconsistencies inherent in AI-generated content without requiring active user participation 10. These systems analyze factors such as texture inconsistencies, temporal anomalies, and physiological impossibilities that are difficult for current deepfake generation technologies to replicate perfectly.
Multimodal Biometric Fusion
One of the most promising defenses against deepfake attacks is the implementation of multimodal biometric systems that combine multiple authentication factors. Research shows that while attackers might successfully spoof one biometric modality, creating convincing fakes across multiple modalities simultaneously becomes exponentially more difficult 11, 12.
Companies are developing systems that integrate facial recognition, voice authentication, and behavioral biometrics into unified platforms. For example, Mitek’s MiPass® solution combines advanced facial and voice biometrics with passive liveness detection specifically to safeguard against deepfakes, synthetic identities, and identity theft 9.
AI-Powered Detection Systems
The fight against AI-generated attacks increasingly requires AI-powered defense systems. Researchers have developed sophisticated detection frameworks that can identify deepfakes by analyzing high-level audio-visual biometric features and semantic patterns 13. These systems focus on detecting characteristics that current deepfake generation technologies struggle to replicate, such as individual mannerisms and unique biometric patterns that persist across different contexts.
Advanced detection systems employ ensemble learning approaches and transformer-based architectures to improve accuracy in identifying synthetic content 11. These systems can achieve authentication accuracy rates exceeding 99.5% while maintaining spoof detection rates above 99.3% 11.
Tokenization and Privacy-Preserving Solutions
A fundamental shift in biometric security involves moving away from storing raw biometric templates to using irreversibly transformed tokens. Companies like Trust Stamp have developed technologies that replace biometric templates with cryptographic hashes that can never be rebuilt into original data 14, 15. These Irreversibly Transformed Identity Tokens (IT2) maintain matching capability while eliminating the risk of biometric data theft and misuse.
This approach addresses both deepfake vulnerabilities and privacy concerns by ensuring that even if systems are compromised, the stolen data cannot be used to recreate biometric information or generate convincing synthetic reproductions 14, 15.
Behavioral and Continuous Authentication
The future of biometric security increasingly relies on behavioral analysis and continuous authentication rather than single-point verification. Systems are being developed that monitor keystroke dynamics, mouse movements, and other behavioral patterns to create unique user profiles that are extremely difficult to replicate through synthetic means 16, 17.
Zero-trust architectures that implement continuous authentication represent a significant advancement in combating deepfake threats 18, 19. These systems continuously verify user identity throughout a session, making it much more challenging for attackers to maintain unauthorized access even if they successfully bypass initial authentication.
Industry Response and Future Outlook
The biometric industry has recognized the severity of the deepfake threat and is investing heavily in countermeasures. Companies are developing specialized solutions for different attack vectors, including injection attack detection that protects against virtual cameras and software-based spoofing attempts 10. These systems can detect when fraudsters use emulators, cloning apps, or other software tools to inject synthetic content into authentication processes.
The integration of artificial intelligence into biometric systems is driving improvements in both accuracy and security. AI-driven algorithms are enhancing biometric processing speeds and fraud detection capabilities while continuously learning and adapting to new attack methods 20. Modern facial recognition systems now achieve accuracy levels exceeding 99.5% under optimal conditions while incorporating sophisticated anti-spoofing measures 20.
Recommendations for Organizations
Organizations implementing or upgrading biometric authentication systems should consider several key strategies:
Adopt Multimodal Approaches: Implement systems that combine multiple biometric factors rather than relying on single-modality authentication. This significantly increases the difficulty for attackers to create convincing synthetic reproductions across all required modalities 12.
Implement Advanced Liveness Detection: Deploy passive liveness detection systems that can identify synthetic content without requiring user interaction. These systems should be regularly updated to address new deepfake generation techniques 21.
Consider Tokenization Technologies: Evaluate privacy-preserving biometric solutions that use irreversible tokenization to eliminate the risk of biometric data theft and reduce the potential for synthetic identity creation 14, 15.
Plan for Continuous Authentication: Develop zero-trust architectures that continuously verify user identity throughout sessions rather than relying solely on initial authentication 18, 19.
Stay Current with Threat Intelligence: Maintain awareness of evolving deepfake technologies and attack methods to ensure defensive measures remain effective against emerging threats 4.
Investigate PhotolokÒ : It is a passwordless IAM solution that uses photos – not passwords. Photolok can be used as a second factor behind a biometric to prevent access and authentication. Its unique architecture protects against AI attacks as well as lateral movements. To learn more, go to www.netlok.com .
The rise of deepfakes and synthetic IDs represents a paradigm shift in cybersecurity threats, but the biometric industry is actively developing sophisticated countermeasures. Success in this evolving landscape will require organizations to adopt comprehensive, multi-layered approaches that combine advanced detection technologies, continuous authentication, and privacy-preserving architectures. While the challenges are significant, the continued advancement of defensive technologies provides hope for maintaining the security and integrity of biometric authentication systems in the face of increasingly sophisticated synthetic attacks.
A.R. Perez, Netlok, June 2025
To enhance their performance, bad actors favor methods that increase the breath of their attacks at the fastest speed possible. As a result, password theft has emerged as the preferred attack vector for cybercriminals, enabling them to compromise systems with unprecedented speed and scale. Unlike traditional hacking methods that require exploiting technical vulnerabilities, credential theft provides attackers with legitimate access that appears normal to security systems, creating a path of least resistance for rapid and extensive exploitation 1, 2. This analysis examines how stolen passwords accelerate and expand attack capabilities across multiple dimensions.
Accelerated Initial Compromise and Lateral Movement
Rapid Breakout Times
The speed at which attackers can move from initial access to broader network exploitation has dramatically increased due to credential theft. Recent research shows that the average “breakout time” – the period between initial compromise and lateral movement – has decreased to just 62 minutes in 2024, down from 84 minutes the previous year 3. In extreme cases, attackers achieved lateral movement in as little as 2 minutes and 7 seconds, with initial discovery tools being deployed within 31 seconds of gaining access 3.
Bypassing Technical Barriers
Password theft eliminates the need for complex technical exploits, allowing attackers to simply “log in” rather than “hack in” 2. This approach bypasses many traditional security controls, as the activity appears legitimate to monitoring systems 2, 4. When attackers use valid credentials, they can blend with normal traffic patterns, making detection extremely difficult and enabling faster movement throughout the network 4, 5.
Streamlined Lateral Movement
Stolen credentials enable several efficient lateral movement techniques:
These techniques enable attackers to move laterally through networks within minutes rather than hours or days, dramatically reducing the time from initial breach to full compromise 1, 2.
Automated Exploitation at Scale
Mass Credential Testing
Password theft enables attackers to automate exploitation at unprecedented scale through credential stuffing attacks. Using specialized tools, cybercriminals can test thousands or millions of stolen username/password combinations across multiple services simultaneously 8, 10. This automation allows a single attacker to target vast numbers of accounts across different organizations with minimal effort 8, 5.
Rapid Exploitation of Stolen Credentials
Research shows that stolen credentials are exploited with alarming speed. According to security researchers, approximately 20% of compromised accounts are accessed within one hour of credentials being exposed, 40% within six hours, and about half within 12 hours 11. This rapid exploitation timeline means organizations have very little time to respond once credentials are compromised 11.
Distributed Attack Infrastructure
Modern credential theft operations leverage sophisticated infrastructure to maximize speed and scale:
This infrastructure enables attackers to compromise thousands of accounts across multiple organizations in a matter of hours, far faster than would be possible with traditional exploitation methods 8, 5.
Multi-System Compromise Through Password Reuse
Exploiting Password Reuse Patterns
Password theft is particularly effective because of widespread password reuse. Recent studies of over 16 billion exposed passwords reveal that 94% are reused or duplicated across multiple accounts, with only 6% being unique 12. This behavior creates a multiplier effect where a single stolen password can provide access to numerous systems 13, 12.
Predictable Password Modifications
Even when users attempt to create variations of their passwords across different services, they typically follow predictable modification patterns that attackers can easily anticipate 9. Research shows that among users who modify their passwords, there is only a small set of common rules applied, making these variations highly predictable to attackers 9.
Cross-Domain Exploitation
Password reuse enables attackers to rapidly expand their reach across different security domains:
This cross-domain exploitation dramatically increases the speed and breadth of attacks, allowing cybercriminals to quickly pivot from a single compromised account to dozens or hundreds of systems across multiple organizations 13, 10.
Bypassing Multi-Factor Authentication
Session Token Theft
Modern credential theft has evolved beyond simple password stealing to include techniques that bypass multi-factor authentication (MFA). Attackers now target session tokens and cookies, which allow them to hijack active authenticated sessions without needing to re-authenticate or trigger MFA challenges 15, 16.
Pass-the-Cookie Attacks
In these attacks, cybercriminals steal browser cookies that store authentication information and use them to impersonate legitimate users in separate browser sessions 15. This technique is particularly effective because it completely circumvents MFA, allowing attackers to access protected systems without triggering additional authentication steps 15, 17.
MFA Fatigue and Prompt Bombing
When direct MFA bypass isn’t possible, attackers use techniques like MFA fatigue, where they repeatedly trigger authentication prompts until frustrated users approve the request just to stop the notifications 17, 18. This social engineering approach accelerates compromise by exploiting human behavior rather than technical vulnerabilities 17, 19.
These MFA bypass techniques significantly accelerate attacks by eliminating what would otherwise be a major barrier to rapid exploitation, allowing attackers to move through protected systems at nearly the same speed as unprotected ones 17, 18.
Privilege Escalation and Administrative Access
Targeting Privileged Accounts
Password theft enables attackers to specifically target high-value accounts with administrative privileges. By compromising these accounts, attackers can rapidly gain control over entire systems or domains rather than having to gradually escalate privileges through technical exploits 20, 21.
Service Account Exploitation
Service accounts are particularly valuable targets because they often have extensive privileges across numerous systems but may not be subject to the same security controls as user accounts 20. By compromising these accounts, attackers can impersonate critical system functions and quickly gain broad access across the organization 20, 21.
Accelerated Administrative Control
The compromise of privileged credentials dramatically accelerates attacks by providing immediate high-level access. Instead of spending days or weeks gradually escalating privileges through technical vulnerabilities, attackers can gain administrative control within minutes by simply authenticating with stolen administrator credentials 20, 21.
This rapid privilege escalation enables attackers to quickly take control of critical systems, deploy malware across the organization, and establish persistent access before defenders can respond 20, 4.
Enabling Advanced Attack Techniques
Business Email Compromise
Password theft enables sophisticated Business Email Compromise (BEC) attacks, where attackers use compromised email accounts to impersonate executives or trusted partners 22. These attacks are particularly effective because they leverage the trust associated with legitimate email accounts, allowing attackers to quickly convince victims to transfer funds or sensitive information 22.
Supply Chain Attacks
Stolen credentials enable attackers to compromise software supply chains, as demonstrated by recent trojanized supply chain attacks that used GitHub and NPM repositories to distribute malicious code 14. By using legitimate credentials to access development environments, attackers can insert backdoors into software that is then distributed to thousands or millions of downstream users 14.
Ransomware Deployment
Password theft has become a critical enabler for ransomware attacks. With valid credentials, attackers can quickly move through networks, disable security controls, and deploy ransomware across multiple systems simultaneously 23. This accelerated deployment significantly reduces the time between initial compromise and complete encryption of an organization’s data 23.
These advanced techniques demonstrate how password theft enables attackers to not only move faster within individual systems but also to rapidly expand the scope and impact of their attacks across entire supply chains and business ecosystems 14, 22.
The Credential Theft Ecosystem
Specialized Attack Infrastructure
The credential theft ecosystem has evolved into a sophisticated supply chain with specialized roles that increase both speed and scale:
This specialization has increased the efficiency and effectiveness of credential theft operations, allowing cybercriminals to focus on their specific expertise while participating in the broader ecosystem 9, 23.
Infostealer Malware Proliferation
The dramatic rise of infostealer malware specifically targeting credentials has created a self-reinforcing cycle of compromise. Research indicates a 266% year-on-year increase in the deployment of information-stealing malware designed to extract passwords from browsers, password managers, and system files 23, 9.
Dark Web Marketplaces
The dark web marketplace for stolen credentials has reached unprecedented scale, with over 16 billion usernames and passwords from data breaches currently available 12, 10. This abundant supply enables attackers to quickly obtain valid credentials for almost any target organization, eliminating the need for time-consuming reconnaissance and vulnerability discovery 12, 10.
This ecosystem dramatically accelerates attacks by providing immediate access to valid credentials, allowing attackers to skip the most time-consuming phases of traditional attacks and move directly to exploitation 9, 10.
Conclusion: The Speed and Scale Advantage
Password theft has fundamentally changed the cybersecurity landscape by enabling attacks that are both faster and broader than traditional exploitation methods. By leveraging legitimate credentials, attackers can bypass security controls, move laterally through networks, and compromise multiple systems at unprecedented speed and scale 12.
The combination of automated tools, widespread password reuse, and sophisticated bypass techniques has created an environment where a single compromised password can lead to enterprise-wide compromise in a matter of hours rather than days or weeks 3, 11. This acceleration presents significant challenges for defenders, as the window for detection and response continues to shrink 32.
Organizations must recognize that traditional security models focused on perimeter defense are insufficient against credential-based attacks. Instead, a more comprehensive approach is needed that addresses both the technical and human aspects of security, including stronger authentication mechanisms, improved monitoring of user behavior, and enhanced security awareness training 5, 22.
As attackers continue to refine their credential theft techniques, the gap between the effort required to compromise systems through password theft versus technical exploits will likely widen further, making credential protection an increasingly critical component of effective cybersecurity strategies 5, 9.
One solution that prevents password exploitation is Netlok’s PhotolokÒ because it replaces passwords with photos and uses randomization to protect against AL/ML attacks. For users, it is simple to use, ultrasecure, and cost effective when compared to passwords.
A.R. Perez, Netlok, June 24, 2025
Like most people and organizations, cybercriminals value their time and cost of doing business. As a result, they have increasingly shifted their tactics from complex technical exploits to credential theft to increase their ROI. This preference for “logging in” rather than “hacking in” represents a fundamental change in attack methodology that has profound implications for organizations and individuals alike 1, 2. The reasons behind this strategic shift are multifaceted, combining economic incentives, technical advantages, and human vulnerabilities.
The Path of Least Resistance
Cybercriminals, like most rational actors, seek the most efficient route to their objectives 3. Password theft has emerged as the definitive path of least resistance in the cybercrime ecosystem for several compelling reasons:
Lower Technical Barriers
Traditional hacking methods often require specialized technical knowledge, including understanding of software vulnerabilities, network protocols, and custom exploit development 4. In contrast, credential theft can be executed with minimal technical expertise using widely available tools 5. This accessibility has democratized cybercrime, allowing a broader range of threat actors to participate regardless of their technical background 6.
The commoditization of the underground economy has created multiple paths of lower resistance, with suppliers providing different services for various aspects of fraud operations6. These services significantly lower the cost of attacks and reduce the barrier to entry for aspiring cybercriminals 6, 7.
Higher Success Rates
IBM’s X-Force threat intelligence team reported a staggering 71% increase in attacks relying on valid login credentials in 2023 compared to the previous year 1, 8. This dramatic shift reflects the effectiveness of credential-based approaches compared to technical exploits 5. Charles Henderson, global head of IBM’s X-Force team, described this as “an aha moment on the part of threat actors in shifting to something that works” 5.
The success of credential theft is further amplified by human behavior patterns, particularly password reuse across multiple services 9. Research shows that 52% of users reuse or modify their passwords across different online services, creating a cascading vulnerability effect where a single breach can compromise multiple accounts 10.
Economic Advantages
Cost-Effectiveness
From a purely economic perspective, password theft offers cybercriminals an exceptional return on investment compared to technical hacking methods 5:
Abundant Supply of Credentials
The dark web marketplace for stolen credentials has reached unprecedented scale, creating a self-sustaining ecosystem that fuels further attacks 13. Over 15 billion usernames and passwords from 100,000 data breaches are currently available on underground marketplaces 13. This number represents a 300% increase since 2018, equivalent to more than two compromised accounts for every person on Earth 13.
More recently, cybersecurity researchers confirmed that nearly 16 billion passwords were leaked and exposed in data breaches between 2024 and 2025, providing attackers with an enormous arsenal for conducting further attacks 9, 7.
Stealth and Detection Evasion
Blending with Legitimate Traffic
One of the most significant advantages of credential-based attacks is their ability to evade detection by security systems 5. When attackers use valid credentials, they can blend in with normal traffic patterns, making it extremely difficult for security tools to distinguish malicious activity from legitimate user behavior 25.
Traditional security measures such as firewalls and intrusion detection systems are designed to identify anomalous network activity or malicious code execution 2. However, when an attacker simply logs in with valid credentials, these systems often fail to detect the intrusion because the activity appears legitimate from a technical perspective 28.
Extended Dwell Time
The stealthy nature of credential-based attacks allows cybercriminals to maintain a persistent presence within compromised systems 5. According to IBM’s Cost of a Data Breach Report, breaches involving compromised credentials take significantly longer to detect and contain, averaging 292 days—the longest of any attack vector studied 14.
This extended dwell time provides attackers with ample opportunity to move laterally within networks, escalate privileges, and exfiltrate sensitive data without triggering security alerts 25. By the time the breach is discovered, the damage has often already been done 14.
Human Vulnerability Exploitation
Predictable Password Behaviors
Cybercriminals exploit fundamental human tendencies in password creation and management 9. Despite decades of cybersecurity education, password practices remain fundamentally flawed 9. Analysis of exposed passwords revealed that 94% were reused or duplicated across multiple accounts, with only 6% being unique 9.
The most commonly used passwords continue to be predictably weak, with “123456,” “admin,” “12345678,” “password,” and “Password” topping the list 9. Additionally, 42% of users rely on passwords with only 8-10 characters, with eight characters being the most popular length 9. These predictable patterns make password guessing attacks highly effective 9 15.
Password Modification Patterns
Even when users attempt to create variations of their passwords across different services, they typically follow predictable modification patterns that can be easily anticipated by attackers 10. Research shows that among a large user population, there is only a small set of rules that users often apply to modify their passwords 10. This “low variance” makes modified passwords highly predictable, with algorithms able to guess 30% of modified passwords within just 10 attempts 10.
The Cybercriminal Ecosystem
Specialized Roles and Services
The credential theft ecosystem has evolved into a sophisticated supply chain with specialized roles 16:
This specialization has increased the efficiency and effectiveness of credential theft operations, allowing cybercriminals to focus on their specific expertise while participating in the broader ecosystem16.
Infostealer Malware Proliferation
A significant development in recent years is the dramatic rise of infostealer malware specifically targeting credentials 1. The X-Force team observed a 266% year-on-year uptick in the deployment of infostealing malware 8. These specialized tools extract passwords from browsers, password managers, and system files, then transmit them to command-and-control servers operated by cybercriminals 16, 8.
The proliferation of infostealers has created a self-reinforcing cycle where compromised credentials fuel further attacks 1. More than 23 million devices have been affected by infostealers, creating vast repositories of stolen login data that criminals can exploit 1.
Conclusion: The Shifting Cybersecurity Paradigm
The preference for password theft over direct hacking methods represents a fundamental shift in the cybersecurity landscape 2. As Charles Henderson of IBM noted, “What this establishes is that the criminals have figured out that valid credentials are the path of least resistance, and the easiest way in” 5.
This shift requires a corresponding evolution in defensive strategies 2. Organizations must recognize that traditional perimeter-based security models are insufficient against credential-based attacks 2. Instead, a more comprehensive approach is needed that addresses both the technical and human aspects of security, including stronger authentication mechanisms, improved monitoring of user behavior, and enhanced security awareness training 25.
One viable passwordless solution is Netlok’s PhotolokÒ MFA login because it replaces passwords with photos and uses randomization to protect against AL/ML attacks. For users, it is simple to use, ultrasecure, and cost effective when compared to passwords.
As attackers continue to refine their credential theft techniques, the gap between the effort required to compromise systems through password theft versus technical exploits will likely widen further 5 11. Understanding this dynamic is essential for developing effective security strategies that can adapt to the evolving threat landscape 5.