All Posts
Research
1
min read

Why Brand Monitoring is a Security Issue - Compromised Credentials

A Threat Intelligence Platform helps companies to engage in Brand Monitoring, which protects employees, customers, and brands from compromised credentials
Published on
May 3, 2017
Table of Contents
<p>Corporate brands are generally thought of as intangible objects that carry the company’s image and reputation. However, your brand is very tangible in the eyes of attackers and can absolutely be targeted and damaged with cyber threats. To prevent such damage, companies can engage in “brand monitoring”. More specifically, this means searching for <a href="https://www.anomali.com/blog/why-brand-monitoring-is-a-security-issue-typosquatting">typosquatting</a> and compromised credentials. While different in intent and practice, both tactics rely on human behaviors to achieve their goals. Such attacks are difficult to detect because the damage can occur outside of a company’s domain, and difficult to prevent because they involve a change in habit rather than corporate policy. In the second part of this series we’ll explain how adversaries can expose credentials, why it matters, and what courses of action a company can take to effectively protect their brand.</p><h2>Compromised/Exposed Credentials</h2><p>A major concern for companies is exposure of corporate account credentials such as user IDs and passwords. We all know people tend to use the same password across multiple sites, and users often register for non-business sites using corporate email addresses. Adversaries will hack into 3rd party sites and steal all possible credentials, later posting or selling them on the <a href="https://www.anomali.com/blog/shedding-some-light-on-the-dark-web">Dark Web</a>. This means breaches outside of a company’s network are of great concern, and highly relevant to their network.</p><p>Almost daily we read about another major site losing millions of user credentials. While many of these breaches become front-page news, and the target often issues notices to affected users,  many more credentials are stolen without anyone’s knowledge. These credentials often get posted and sold on Dark Web sites. Our own research of the <a href="https://wwwlegacy.anomali.com/files/FTSE_100_REPORT.pdf" target="_blank">UK FTSE 100: Targeted Brand Attacks and Mass Credential Exposure</a> companies found each company had an average of 50 user credentials listed on Dark Web sites.</p><p style="text-align: center;"><img alt="" src="https://cdn.filestackcontent.com/P7u1FwNTTuexhLcMGld8" style="width: 720px;"/></p><h2>What to do about compromised credentials</h2><p>There are a few courses of action that organizations can (and should) take to prevent against abuse of compromised credentials.</p><p style="text-align: center;"><img alt="" src="https://cdn.filestackcontent.com/DVcrpmnxSPyhdaRsMYaV"/></p><p>The first step in responding to a leak of credentials is to reset passwords for all affected accounts. Depending on the type of company, they may wish to force a reset not just for employees but for customers/partners/contractors as well. Companies should also require stronger passwords, which in this case doesn’t mean a mildly infuriating number of special characters but rather a separate password for private and corporate accounts.</p><p>Next is to require Multi-Factor Authentication (MFA). MFA is highly recommended for email accounts, which are considered to be the “single point of failure”. This is because any account that requires a password reset will be sent to an individual’s email, which means that a malicious actor with access to your email can access most any account. It is also highly beneficial for companies to enforce a password audit at set intervals, thus cutting off access to any potentially infected employee accounts.</p><p>Anomali specifically monitors the Dark Web for sharing of user IDs and passwords, and collects credentials through automated processes. These collected credentials are available to customers through a feed within the Anomali <a href="https://www.anomali.com/products/threatstream">Threat Intelligence Platform</a>. Similar to scanning for malicious domains, the platform can also be configured to alert customers when their domain is found within lists of credentials on the Dark Web.</p><div style="padding:20px 20px 30px 20px;background:#cfe6f5;margin-bottom:30px;-webkit-border-radius:8px;-moz-border-radius:8px;border-radius:8px;"><div class="row"><div class="col-xs-12 col-sm-4 center"><a href="{page_1609}"><img alt="Compromised Credentials Infographic" src="https://cdn.filestackcontent.com/lKGD2tZTTzyfYItICyor" style="margin-bottom:10px;"/></a></div><div class="col-xs-12 col-sm-8"><h4 class="nobottommargin"><a href="{page_1609}">Compromised Credentials: The Power of the Password</a></h4><p style="margin-bottom:20px;">Why you should care and what can you do.</p><p class="nobottommargin"><a href="{page_1609}">VIEW NOW</a></p></div></div></div><h2>Conclusion</h2><p>Malicious actors inflict damage to a company’s reputation by exposing credentials and stealing data. This tactic relies on predictable human behaviors, and is best mitigated through education, research, and tighter regulations. A <a href="https://www.anomali.com/products/threatstream">Threat Intelligence Platform</a> can simplify the process, and ultimately protect employees, customers, and brands.</p><p>Similar reports to the FTSE 100 were conducted for the <a href="https://wwwlegacy.anomali.com/files/anomali-labs-reports/DAX-100.pdf" target="_blank">DAX 100</a> and <a href="https://wwwlegacy.anomali.com/files/anomali-labs-reports/OMX-30.pdf" target="_blank">OMX 30</a>.</p>

FEATURED RESOURCES

January 20, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Remcos RAT, BitB phishing, Linux Malware Framework, Supply Chain Intrusion and more

New Malware Campaign Delivers Remcos RAT Through Text-Only Staging and Living-Off-the-Land Execution. Browser-in-the-Browser Phishing Evolves into a High-Fidelity Credential Trap. Cloud-Aware Linux Malware Framework Poised for Future Threats. And More..
Read More
January 13, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Anomali Cyber Watch: Cisco ISE Flaw Enables Arbitrary File Read via Administrative Access. Ni8mare and N8scape Vulnerabilities Expose n8n Automation Platforms to Full Compromise. Zero-Click Prompt Injection Abuse Enables Silent Data Exfiltration via AI Agents. Phishing Attacks Exploit Misconfigured Email Routing to Spoof Internal Domains. Ransomware Activity in the U.S. Continued to Rise in 2025. Android Ghost Tap Malware Drives Remote NFC Payment Fraud Campaigns. Black Cat SEO Poisoning Malware Campaign Exploits Software Search Results. MuddyWater Upgrades Espionage Arsenal with RustyWater RAT in Middle East Spear-Phishing. China-Linked ESXi VM Escape Exploit Observed in the Wild. Instagram Denies Data Breach Despite Claims of 17.5 Million Account Data Leak
Read More
January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
Explore All