Dashboard
Account 🔐
Sign Up
Login
Global Leaderboard
Game Vault
Badge Backpack
Blue Team Glossary
Login and start playing
Leaving so soon?
×
You really want to log out? We were having so much fun!
Home
›
Glossary
›
Security Concepts
›
compromised-credentials
Compromised-Credentials
Security Concepts
Definition
Compromised credentials refer to usernames, passwords, tokens, or authentication data that have been exposed, stolen, or otherwise accessed by an unauthorized party. Once credentials are compromised, an attacker can impersonate a legitimate user or system and gain access to resources without triggering traditional authentication defenses. Credentials can be exposed in many ways, including phishing attacks, malware infections, data breaches, password reuse across multiple services, or accidental disclosure. Because the access appears legitimate, compromised credentials are especially dangerous and often difficult to detect.
Explore More Terms
Mitre-Atlas
Parse
Mv-Expand
Privilege_escalation
Mitre-Att&ck
Examples & Use Cases
Common scenarios involving compromised credentials include: * An attacker uses stolen login details from a phishing email to access a corporate email account * Credentials leaked in a third-party data breach are reused to access internal systems * Malware captures keystrokes or stored passwords from an infected device * API keys or access tokens are accidentally exposed in public code repositories Indicators of compromised credentials may include unusual login times, access from unfamiliar locations, impossible travel scenarios, or abnormal user behavior after login. Security teams often rely on monitoring, anomaly detection, and identity protection tools to identify these signs. Mitigation strategies include enforcing multi-factor authentication (MFA), using strong and unique passwords, implementing credential rotation policies, and monitoring for known leaked credentials. Limiting access through least privilege and strong authorization controls can also reduce the impact if credentials are compromised. --- ## Further Reading * [Proofpoint - What Is Credential Compromise?](https://www.proofpoint.com/us/threat-reference/credential-compromise) * [Exabeam - Compromised Credentials: Causes, Examples, and Defensive Measures](https://www.exabeam.com/explainers/insider-threats/compromised-credentials-causes-examples-and-defensive-measures/)