WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Security Awareness – Threat Actors Increasingly Exploiting Legitimate Services for Credential Theft
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Security Awareness – Threat Actors Increasingly Exploiting Legitimate Services for Credential Theft

Author: Alec Davison

Created: Tuesday, June 20, 2023 - 19:00

Categories: Cybersecurity, Security Preparedness

Threat actors are increasingly exploiting legitimate online services to conduct attacks for stealing credentials and exfiltrating data while remaining undetected from unsuspecting victims, according to security researchers at Check Point.

Credential harvesting continues to be one of the top attack vectors, with 59 percent of attacks tracked by Check Point involving credential theft. To obtain a victim’s credentials, phishing emails often contain a malicious URL or attachment. Based on Check Point’s telemetry more than 50 percent of malicious attachments are HTML files. And in order to fool the victim, many malicious HTML attachments are disguised as a login pages of legitimate services and vendors such as Microsoft. Check Point discusses a new method of using a legitimate form service’s API that makes malicious HTML files hard to block and easy to send the stolen credentials wherever the attacker chooses, even their own mailbox. To defend against this and other forms of credential theft, members are encouraged to remind end users to always be wary of messages that require urgent actions and ones that instruct them to click on a link, open an attachment, or enter their credentials to “gain access.” Users should also be reminded to reach out to the purported sender via another means of communication to confirm a message’s authenticity. Lastly, Check Point provides additional recommendations and potential indicators of compromise associated with this threat activity. Read more at Check Point.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Gate 15 TARGET Report – Identity Centric Attacks: The Shift from Network to Identity as the Primary Attack Surface

May 7, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Guidance for Careful Adoption of Agentic AI Services

May 7, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar