{"id":4137,"date":"2026-01-16T19:37:56","date_gmt":"2026-01-16T19:37:56","guid":{"rendered":"https:\/\/ft365.org\/index.php\/2026\/01\/16\/account-compromise-surged-389-in-2025-says-esentire\/"},"modified":"2026-01-16T19:37:56","modified_gmt":"2026-01-16T19:37:56","slug":"account-compromise-surged-389-in-2025-says-esentire","status":"publish","type":"post","link":"http:\/\/ft365.org\/index.php\/2026\/01\/16\/account-compromise-surged-389-in-2025-says-esentire\/","title":{"rendered":"Account Compromise Surged 389% in 2025, Says eSentire"},"content":{"rendered":"<div id=\"cphContent_pnlArticleBody\">\n<div id=\"layout-f1cbec24-37d7-4a18-a224-3d05d7e25a09\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>Cyber threat actors went all in on credential theft in 2025, with eSentire reporting a 389% year-over-year rise in account compromise, making up 55% of all attacks observed by the cybersecurity firm.<\/p>\n<p>The firm\u2019s <em>2025 Year in Review &#038; 2026 Threat Landscape Outlook Report<\/em>, published on January 15, 2026, showed that credential access represented 75% of the malicious activity observed in the wild by its Threat Response Unit (TRU) over the reported period.<\/p>\n<p>Two-thirds of it was aimed at conducting account takeovers and another third to deliver phishing campaigns. Microsoft 365 accounts were prime targets, noted eSentire<\/p>\n<p>Meanwhile, malware continued to be a prime threat, accounting for 25% of threats observed in the wild, but declined by four percentage points compared to 2024 data.<\/p>\n<\/p><\/div>\n<figure id=\"layout-c447f404-f853-406f-a183-84c13bf28913\" data-layout-id=\"4\" data-edit-folder-name=\"image\" data-index=\"1\"><img decoding=\"async\" src=\"http:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/localimages\/41eb1674-417a-403b-b5b3-6b89f00785d2.jpeg\" alt=\"Source: eSentire, Year in Review &#038; 2026 Threat Landscape Outlook Report, \u201cThe Industrialization of Cybercrime: Identities are Under Attack,\u201d January 2026\"><figcaption>Source: eSentire, Year in Review &#038; 2026 Threat Landscape Outlook Report, \u201cThe Industrialization of Cybercrime: Identities are Under Attack,\u201d January 2026<\/figcaption><\/figure>\n<div id=\"layout-f7cc13e3-b215-4c43-a6d9-debd63dfd486\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"2\">\n<h2><strong>PHaaS Fueled Business Email Compromise<\/strong><\/h2>\n<p>The use of valid credentials to spread email-based malicious campaigns was the top initial access vector among incidents experienced by over 2000 of eSentire customers, rising from 37% to 55% of total security incidents year-over-year.<\/p>\n<p>Most of these attacks stemmed from operations enabled by phishing-as-a-service (PhaaS) kits, which accounted for 63% of all account compromise incidents.<\/p>\n<p>Additionally, the report noted that threat actors use PhaaS operations like Tycoon2FA, FlowerStorm and EvilProxy to carry out business email compromise (BEC) attacks.<\/p>\n<p>Spence Hutchinson, senior manager of TRU and lead investigator for the report, highlighted the sophistication of some PHaaS kits. \u201cThese PhaaS kits are not made up of simple templates; they are comprehensive, continuously updated offerings, designed to bypass modern security controls, such as multifactor authentication (MFA). It is the widespread availability and continuous evolution of these PhaaS kits that are fueling the account takeover epidemic that is impacting businesses.&#8221;<\/p>\n<p>While BEC represented less than 10% of malicious activity observed in 2025 \u2013 a 21-percentage point decline compared to 2024 \u2013 it continued to be a top threat for companies, the TRU researchers said.<\/p>\n<p>\u201cThe hackers can initiate BEC actions, such as creating inbox forwarding rules in as little as 14 minutes, after they have captured a target\u2019s corporate login credentials and session token and successfully entered the target\u2019s IT network,\u201d reads the report.<\/p>\n<p>Companies in real estate, finance, retail and construction are the sectors most targeted by BEC attacks.<\/p>\n<h2><strong>Key Highlights from eSentire\u2019s 2025 Threat Report<\/strong><\/h2>\n<p>Other key highlights from the eSentire report included:<\/p>\n<ul>\n<li>A 14 times increase of security incidents involving the combination of email bombing and IT Help Desk impersonation attacks, with companies in the legal industry most targeted<\/li>\n<li>A 300% spike of the ClickFix lure, representing over 30% of all malware delivery cases<\/li>\n<li>The software industry experiencing the largest numbers of security incidents in 2025 (+15% compared to 2024), followed by manufacturing, which saw a 32% year-over-year increase, and business services with an 8% increase from last year<\/li>\n<li>The construction industry and the hospitality and legal sectors benefiting from a decrease in cyber incidents in 2025<\/li>\n<\/ul>\n<p><em>Read now: ClickFix Social Engineering Sparks Rise of CastleLoader Attacks<\/em><\/p>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber threat actors went all in on credential theft in 2025, with eSentire reporting a 389% year-over-year rise in account compromise, making up 55% of all attacks observed by the cybersecurity firm. The firm\u2019s 2025 Year in Review &amp; 2026 Threat Landscape Outlook Report, published on January 15, 2026, showed that credential access represented 75%<\/p>\n","protected":false},"author":2,"featured_media":4138,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4137","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4137-afef8412-dc49-49da-bd99-1d9fc9e4d1db.jpg",300,300,false],"thumbnail":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4137-afef8412-dc49-49da-bd99-1d9fc9e4d1db-150x150.jpg",150,150,true],"medium":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4137-afef8412-dc49-49da-bd99-1d9fc9e4d1db.jpg",300,300,false],"medium_large":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4137-afef8412-dc49-49da-bd99-1d9fc9e4d1db.jpg",300,300,false],"large":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4137-afef8412-dc49-49da-bd99-1d9fc9e4d1db.jpg",300,300,false],"1536x1536":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4137-afef8412-dc49-49da-bd99-1d9fc9e4d1db.jpg",300,300,false],"2048x2048":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4137-afef8412-dc49-49da-bd99-1d9fc9e4d1db.jpg",300,300,false],"morenews-featured":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4137-afef8412-dc49-49da-bd99-1d9fc9e4d1db.jpg",300,300,false],"morenews-large":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4137-afef8412-dc49-49da-bd99-1d9fc9e4d1db.jpg",300,300,false],"morenews-medium":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4137-afef8412-dc49-49da-bd99-1d9fc9e4d1db.jpg",300,300,false],"crawlomatic_preview_image":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/4137-afef8412-dc49-49da-bd99-1d9fc9e4d1db-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"http:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"http:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/4137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=4137"}],"version-history":[{"count":0,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/4137\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/4138"}],"wp:attachment":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=4137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=4137"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=4137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}