Home » Blog » First, threat actors look for the first weakness

First, threat actors look for the first weakness

Outer perimeter, like your people or weakness on-premises cambodia telegram data infrastructure. They might start by sending phishing emails to your employees to gain a first set of credentials, or skip the process entirely by running malware on target systems to gather information via keylogger. If they recognize that you have an on-premises directory service installation like AD, they might run exploits against it directly, much like lock-picking the bank’s front door.

They have an angle, but the weakness work has just begun

2. Reconnaissance
Once threat actors can peek inside your organization, they tiptoe around and hoover up as much information as they can. What are they looking for?

Active and legitimate accounts expertise is your best friend with administrator-level access they need to get at the true target: your SaaS data.

More context, found across your on-premises

network, as to what other services and systems the account, service, or device they compromised can access.
Service accounts with high privileges agb directory and low levels of monitoring.
Prolific users, which are standard user accounts with lots of access and less protection than administrator accounts.

Scroll to Top