This resource is no longer available
ACID seeded 8,000+ phishing sites with fake credentials to monitor bad actors, and found that 50% of compromised accounts were accessed within 12 hours.
Through ACID’s analysis, they gained insights into what cybercriminals do with an email account after they have stolen the credentials
Learn about how their new insights answer important questions about the lifecycle of the attack including:
- How quickly are compromised accounts accessed?
- What methods are used to access compromised accounts?
- What do cybercriminals do with the compromised accounts?
- And more