Valid accounts
Cybersecurity statistics about valid accounts
Top Vendors
Showing 1-3 of 3 results
Nearly one in three attacks observed by X-Force used valid accounts.
IBM •4/17/2025•
Cyber attack
For Initial Access, the most observed technique by DirectDefense is Valid Accounts, which involves leveraging stolen credentials for unauthorized access. Alerts triggered for Initial Access include: First Ingress Authentication from Country, Multiple Country Ingress Authentications, Multiple Wireless Country Authentications.
DirectDefense•4/15/2025•
MITRE ATT&CKInitial access
For Lateral Movement, the most observed technique by DirectDefense is Valid Accounts, using stolen credentials to escalate privileges. Alerts triggered for Lateral Movement include: Lateral Movement – Local Credentials.
DirectDefense•4/15/2025•
MITRE ATT&CKLateral movement