SlideShare a Scribd company logo
Anatomy of Identity-Based
Attacks
As a security practitioner, protecting your organization's data is your top
priority. With the explosion of mobile and hybrid workforces, SaaS
adoption, and application modernization, new attack methodologies are
arising while existing ones resurface. This presentation examines the
anatomy of identity-based attacks and how to mitigate them using
modern identity and access management solutions.
FF
da Francesco Faenzi
The Rise of Identity-Based
Attacks
1 Growing Threat
Over 40% of all breaches
involved stolen credentials
and 80% of web application
breaches involved
credential abuse in 2021.
2 Expanding Attack
Surface
The attack surface
continues to expand
beyond traditional
enterprise and digital
consumer identities to
third-party supplier risk.
3 Ransomware Link
Even ransomware attacks, now comprising 25% of all breaches,
often involve compromised identities to gain initial access.
Password Spray Attacks
How It Works
Attackers attempt to use a few commonly known
passwords across multiple accounts, staying under account
locking thresholds. They may research company password
policies to craft guesses.
Mitigation Strategies
Set lockout policies, implement CAPTCHAs, enforce strong
password requirements, enable threat intelligence, and
implement alerting for failed attempts across accounts.
Credential Stuffing Attacks
Credential Harvesting
Attackers obtain credentials from
data breaches or underground
markets
Automated Testing
Credentials are tested across many
sites using automated tools
Account Takeover
Successful logins allow attackers to
access sensitive data
Machine-In-The-Middle (MITM) Attacks
Intercept Traffic
Attacker positions between user and resource
1
Broker Communication
Traffic flows through attacker's system
2
Capture Credentials
Attacker logs sensitive data like passwords
3
MITM attacks exploit the trust between users and services. Mitigation strategies include using TLS encryption, trusted networks, and phishing-resistant multi-factor authentication.
Phishing Attacks
Spear Phishing
Targeted attacks on specific
individuals
Whaling
Attacks targeting high-ranking
personnel
Vishing
Voice phishing to obtain sensitive information over the phone
Phishing aims to obtain credentials by luring users to malicious sites or
coercing them to provide information. Mitigation includes user training,
behavior detection, and integrating email security solutions.
Machine-to-Machine Communication Risks
1
Secure API Endpoints
Protect machine-to-machine communication
2
Credential Protection
Avoid hardcoding or insecure storage
3
Access Management
Implement proper authentication and authorization
Service account security is often overlooked but critical. By 2024, organizations are expected to manage half a million machine identities
on average. Proper security measures are vital to prevent unauthorized access.
Third-Party Account Risks
1 Federation Setup
Establish trust between identity providers
2 Partner Authentication
Users authenticate to their own IDP
3 Access Resource
Valid assertion allows access to federated resource
4 Potential Compromise
Breach of partner IDP could allow unauthorized access
Mitigate risks by enforcing security controls on your IDP, implementing step-up
authentication, and configuring risk-based policies with phishing-resistant factors
for high-risk logins.
Underground Credential Markets
Dark Web Marketplaces
Stolen credentials and access tokens
sold openly
Malware and Rootkits
Used to harvest credentials from
compromised systems
Defense Strategies
Implement strong MFA, limit token
scope, and use short-lived access
tokens
Protecting Against Identity-
Based Attacks
User Education
Train users on security best practices and phishing awareness
Log Correlation
Implement robust logging and alerting for suspicious activity
Adaptive MFA
Use context-aware, risk-based authentication policies
Threat Intelligence
Leverage global threat data to proactively block malicious activity
A comprehensive security strategy combines user education, robust processes,
and advanced technology to mitigate identity-based attacks and protect your
organization's critical assets.

More Related Content

PDF
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
PPTX
2024 Most Influential Cyber Security Technologies_ A Detailed Recap.pptx
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
PPTX
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
PPTX
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
PPTX
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
PDF
Understanding Identity Management and Security.
PDF
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
2024 Most Influential Cyber Security Technologies_ A Detailed Recap.pptx
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Understanding Identity Management and Security.
The hacker playbook: How to think and act like a cybercriminal to reduce risk...

Similar to Anatomy of Modern Identity-Based Attacks (20)

PPTX
ciso-workshop-3-identity-protection.pptx
PDF
Business Impact of Identity Management In Information Technology
PPTX
Phishing: How to get off the hook using Intelligent IAM
PPTX
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
PPTX
Presentation for information security & hacking
PDF
ML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance
PPTX
Identity and Security in the Cloud
PDF
2024-Cybersecurity-Outlook for all engineering students
PPTX
Information Security Management System in the Banking Sector
PDF
Secure by design
PDF
Secure by design building id based security
PDF
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
PDF
Identity - The Cornerstone of Information Security
PDF
Strong authentication implementation guide
 
PPTX
6 Biggest Cyber Security Risks and How You Can Fight Back
DOCX
Protecting Intellectual Property in the Age of WikiLeaks
PPTX
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
PPT
Security_Updates_cybersecuirty ppt presentation.ppt
PPTX
Smart Identity for the Hybrid Multicloud World
PDF
A Study in Borderless Over Perimeter
ciso-workshop-3-identity-protection.pptx
Business Impact of Identity Management In Information Technology
Phishing: How to get off the hook using Intelligent IAM
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Presentation for information security & hacking
ML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance
Identity and Security in the Cloud
2024-Cybersecurity-Outlook for all engineering students
Information Security Management System in the Banking Sector
Secure by design
Secure by design building id based security
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
Identity - The Cornerstone of Information Security
Strong authentication implementation guide
 
6 Biggest Cyber Security Risks and How You Can Fight Back
Protecting Intellectual Property in the Age of WikiLeaks
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Security_Updates_cybersecuirty ppt presentation.ppt
Smart Identity for the Hybrid Multicloud World
A Study in Borderless Over Perimeter
Ad

More from Francesco Faenzi (16)

PPTX
Security Architecture Anti-Patterns and Design Mistakes
PPTX
Cyber Risk Operation Center … is not a SOC
PPTX
Cyber Security and Resiliency Twin - Anomaly Detection with AI @ Edge
PPTX
Industry 4.0 CyberSecurity Assessment.pptx
PPTX
Advanced Metering Infrastructure Security Test.pptx
PPTX
Customer digital identity and consent management
PPTX
Identità digitale e identità in real-life: rischi e rimedi
PPTX
Telegram chatbot - considerazioni di sicurezza
PPTX
Cyber Threat Intelligence - La rilevanza del dato per il business
PPTX
Cybercrime underground: Vendita ed evoluzione del carding
PPTX
UPDATED - Analysis of exposed ICS / SCADA and IoT systems in Europe
PPTX
Cyber Attack: stories from the field - Threat analysis: useful methodologies ...
PPTX
Analisi del fenomeno carding nei blackmarket
PPTX
Advanced Persistent Threat in ICS/SCADA/IOT world: a case study
PPTX
Analysis of exposed ICS//SCADA/IoT systems in Europe
PPTX
SCADA Cybersecurity: Sessione live di Attacco e Difesa by Lutech & Phoenix Co...
Security Architecture Anti-Patterns and Design Mistakes
Cyber Risk Operation Center … is not a SOC
Cyber Security and Resiliency Twin - Anomaly Detection with AI @ Edge
Industry 4.0 CyberSecurity Assessment.pptx
Advanced Metering Infrastructure Security Test.pptx
Customer digital identity and consent management
Identità digitale e identità in real-life: rischi e rimedi
Telegram chatbot - considerazioni di sicurezza
Cyber Threat Intelligence - La rilevanza del dato per il business
Cybercrime underground: Vendita ed evoluzione del carding
UPDATED - Analysis of exposed ICS / SCADA and IoT systems in Europe
Cyber Attack: stories from the field - Threat analysis: useful methodologies ...
Analisi del fenomeno carding nei blackmarket
Advanced Persistent Threat in ICS/SCADA/IOT world: a case study
Analysis of exposed ICS//SCADA/IoT systems in Europe
SCADA Cybersecurity: Sessione live di Attacco e Difesa by Lutech & Phoenix Co...
Ad

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Encapsulation theory and applications.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
KodekX | Application Modernization Development
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Big Data Technologies - Introduction.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Unlocking AI with Model Context Protocol (MCP)
Mobile App Security Testing_ A Comprehensive Guide.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The Rise and Fall of 3GPP – Time for a Sabbatical?
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Encapsulation_ Review paper, used for researhc scholars
Encapsulation theory and applications.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
KodekX | Application Modernization Development
MYSQL Presentation for SQL database connectivity
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Network Security Unit 5.pdf for BCA BBA.
Big Data Technologies - Introduction.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Review of recent advances in non-invasive hemoglobin estimation
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Anatomy of Modern Identity-Based Attacks

  • 1. Anatomy of Identity-Based Attacks As a security practitioner, protecting your organization's data is your top priority. With the explosion of mobile and hybrid workforces, SaaS adoption, and application modernization, new attack methodologies are arising while existing ones resurface. This presentation examines the anatomy of identity-based attacks and how to mitigate them using modern identity and access management solutions. FF da Francesco Faenzi
  • 2. The Rise of Identity-Based Attacks 1 Growing Threat Over 40% of all breaches involved stolen credentials and 80% of web application breaches involved credential abuse in 2021. 2 Expanding Attack Surface The attack surface continues to expand beyond traditional enterprise and digital consumer identities to third-party supplier risk. 3 Ransomware Link Even ransomware attacks, now comprising 25% of all breaches, often involve compromised identities to gain initial access.
  • 3. Password Spray Attacks How It Works Attackers attempt to use a few commonly known passwords across multiple accounts, staying under account locking thresholds. They may research company password policies to craft guesses. Mitigation Strategies Set lockout policies, implement CAPTCHAs, enforce strong password requirements, enable threat intelligence, and implement alerting for failed attempts across accounts.
  • 4. Credential Stuffing Attacks Credential Harvesting Attackers obtain credentials from data breaches or underground markets Automated Testing Credentials are tested across many sites using automated tools Account Takeover Successful logins allow attackers to access sensitive data
  • 5. Machine-In-The-Middle (MITM) Attacks Intercept Traffic Attacker positions between user and resource 1 Broker Communication Traffic flows through attacker's system 2 Capture Credentials Attacker logs sensitive data like passwords 3 MITM attacks exploit the trust between users and services. Mitigation strategies include using TLS encryption, trusted networks, and phishing-resistant multi-factor authentication.
  • 6. Phishing Attacks Spear Phishing Targeted attacks on specific individuals Whaling Attacks targeting high-ranking personnel Vishing Voice phishing to obtain sensitive information over the phone Phishing aims to obtain credentials by luring users to malicious sites or coercing them to provide information. Mitigation includes user training, behavior detection, and integrating email security solutions.
  • 7. Machine-to-Machine Communication Risks 1 Secure API Endpoints Protect machine-to-machine communication 2 Credential Protection Avoid hardcoding or insecure storage 3 Access Management Implement proper authentication and authorization Service account security is often overlooked but critical. By 2024, organizations are expected to manage half a million machine identities on average. Proper security measures are vital to prevent unauthorized access.
  • 8. Third-Party Account Risks 1 Federation Setup Establish trust between identity providers 2 Partner Authentication Users authenticate to their own IDP 3 Access Resource Valid assertion allows access to federated resource 4 Potential Compromise Breach of partner IDP could allow unauthorized access Mitigate risks by enforcing security controls on your IDP, implementing step-up authentication, and configuring risk-based policies with phishing-resistant factors for high-risk logins.
  • 9. Underground Credential Markets Dark Web Marketplaces Stolen credentials and access tokens sold openly Malware and Rootkits Used to harvest credentials from compromised systems Defense Strategies Implement strong MFA, limit token scope, and use short-lived access tokens
  • 10. Protecting Against Identity- Based Attacks User Education Train users on security best practices and phishing awareness Log Correlation Implement robust logging and alerting for suspicious activity Adaptive MFA Use context-aware, risk-based authentication policies Threat Intelligence Leverage global threat data to proactively block malicious activity A comprehensive security strategy combines user education, robust processes, and advanced technology to mitigate identity-based attacks and protect your organization's critical assets.