Credentials are one of the most sought after targets by cybercriminals. Attackers use stolen or compromised credentials to pivot into corporate networks and exfiltrate sensitive data. Credential stuffing attacks are high in the playbook of adversaries because they are easy to execute with a high success rate.
Heavy industrial firms provide crucial infrastructure for the global economy, whether they create or transmit power or extract or refine oil, gas, or minerals. As a result, cyber-criminals find them appealing targets. By 2018, approximately 60% of firms polled had experienced a compromise in their industrial control (ICS) or supervisory control and data acquisition (SCADA) technologies.