Skip to content

13 April, 2026

  • Saved Articles
  • My Account
  • Subscribe
  • Log In
  • Log Out

Board Agenda

  • Governance
  • Strategy
  • Risk
  • Ethics
  • News
  • Insight
    • Categories

      • View all
      • Governance
      • Strategy
      • Risk
      • Ethics
      • Board expertise
      • Finance
      • Technology
    • AI agents

      The AI risk faced by every board right now

      Even if no one in the organisation planned their arrival, AI agents are already present...

      sustainability litigation

      Is your board at risk of sustainability litigation?

      ESG disclosures, until recently focused on reputational risk and stakeholder expectations, are now becoming legal...

      sustainability Asia

      Navigating sustainability in Asia

      Boards operating across regions need to leave aside assumptions and consider the impact of a...

  • Comment
      • View all
    • AI agents

      The AI risk faced by every board right now

      Even if no one in the organisation planned their arrival, AI agents are already present...

      sustainability litigation

      Is your board at risk of sustainability litigation?

      ESG disclosures, until recently focused on reputational risk and stakeholder expectations, are now becoming legal...

      investor confidence

      Lack of audit reform ‘will hit investor confidence’

      Government's failure to push ahead with audit reform is a risk to UK investments, the...

  • Interviews
      • View All Interviews
      • Podcasts
      • Webinars
    • future-ready

      Is your board ‘future-ready’?

      The survival of a business in uncertain times depends on its ability to pivot as...

      investor confidence

      Lack of audit reform ‘will hit investor confidence’

      Government's failure to push ahead with audit reform is a risk to UK investments, the...

      stewarding AI

      AI is a ‘special case for governance’

      As AI use in the boardroom grows, it’s essential to focus on the ethical and...

  • Board Careers
      • View All
    • female CEO

      Number of women in leadership stays unchanged

      In 2021, there were only eight female CEOs in the FTSE 100—a figure that is...

      female NED

      UK female non-executives earn £73k less than male NEDs

      Although the UK’s average gender pay gap on boards is shrinking, it is still one...

      directors duties

      3 top tips on directors’ duties

      When directors fall short of their responsibilities, the consequences can be devastating. How can board...

  • Resource Centre
      • White Paper Downloads
      • Book Reviews
      • Board Advisory & Corporate Services
    • FRC audit approach cover march 2026

      An evolved audit supervision approach 2026

      The Financial Reporting Council outlines its revised approach to audit supervision, which focuses on firms’...

      Protiviti 2026 governance AI

      The Board’s AI Moment, 2026

      This report, from Protiviti’s 2026 Global Board Governance Survey results, focuses on artificial intelligence.

      HEIDRICK GOVERNANCE 2026

      Governing Under High Uncertainty: Opportunities for Emerging-Market Boards

      This report from Boston Consulting Group, Heidrick & Struggles and INSEAD examines how boards are...

  • Events
  • Search by topic
    • Governance
    • Strategy
    • Risk
    • Ethics
    • Regulation
    • ESG
    • Investor Relations
    • Careers
    • Board Expertise
    • finance
    • Technology

Identity crisis: the threat of malicious credential abuse

by Kamal Bechkoum

The security risks posed by malicious credential abuse is fast becoming every chief information security officer’s worst nightmare.

Employee credentials login screen

Image: Bakhtiar Zein/Shutterstock.com

Favorite

IT security should be a simple concept—it’s essentially about being able to prove you are who you say you are.

The “you” in this context might be an individual logging into a network or service, a device interacting with an application programming interface (API), one network talking to another, or a host of other potential scenarios.

The corresponding proof of identity could be a certificate, a Secure Socket Shell (SSH) key—this is a special network protocol leveraging public-key cryptography, which enables authorised users to remotely access a computer or other devices—or a confirmation code, facial or fingerprint recognition, and not forgetting the enduring favourite, the increasingly outdated and yet seemingly un-killable password.

The basic password and its use on computers dates back to the 1960s and is one of the most familiar and also most heavily abused forms of credential used in computer authentication processes. Technology has since progressed rapidly but the password has not.

Malicious credential abuse is an important security threat which is fast becoming every chief information security officer’s (CISO) worst nightmare. The seriousness of such attacks stems from the fact that they can lead to a widespread penetration of critical network infrastructures.

What is credential abuse?

Credential abuse can come in many guises. One of the most common is when an employee “borrows” a colleague’s user ID and password. The purpose may be benign—to complete a piece of work on time—or malicious, but this behaviour occurs frequently throughout industry and makes a nonsense of assigning privilege levels to specific individuals.

Attackers often masquerade as legitimate users to penetrate the organisation’s systems and gain illegitimate access to data

These situations are further complicated by attackers who often masquerade as legitimate users to penetrate the organisation’s systems and gain illegitimate access to data, which can include even more credentials. Such attacks are likely to result in significant financial or reputational damage, meaning resilience against them should be part of every CISOs’ planning and business recovery processes.

However, just because these attacks are among the most commonplace does not mean a CISO should implement countermeasures based purely on trends or the “popularity” of a threat. A good CISO and their team will work closely with the board to develop an understanding of organisational priorities and what needs to be defended.

The board should also provide business guidance and have an agreed strategy with the CISO. This should include building defence in depth using ISO 27000 series (thematic defence), in conjunction with a Kill Chain response such as the Lockheed Martin Kill Chain for a process or temporal-based defence. In addition, the CISO should develop, and periodically review, these protocols against organisational intelligence developed from horizon scanning or scenario planning, enabling the CISO to prioritise credential abuse tactics against a wider overview.

Brute Force and credential stuffing

Attacks vary. Traditional credential theft and the manipulation of business practices were used in combination in the Scattered Canary attack on US financial benefits early in the Covid-19 pandemic. Built on credential theft, and presumably the storage of credentials, this approach took advantage of the non-verification of financial claims.

A Brute Force attack uses trial-and-error to guess, for example, individual user names and passwords. All possible combinations are attempted in the hope that one of them will result in the correct information. The search space within which the “algorithm” is looking for answers can be very large and, depending on the length and complexity of the password, cracking it using Brute Force can take anywhere from a few minutes to decades. The smaller the search space, the higher the rate of success and the quicker access is gained.

Credential stuffing reduces the search space that Brute Force needs. It uses exposed data from leaked databases or other illegitimate access. The availability of this data dramatically reduces the number of possible correct answers needed to gain access. Both Brute Force and credential stuffing are effective when dealing with accounts that use weak passwords, or whose owners are not particularly cyber-savvy, but less so with more secure systems.

AI-augmented algorithms

The use of AI-augmented algorithms adds sophistication to the attacker’s arsenal. AI Bots are used to gather pertinent data—for example, chatbots realistically befriending employees on social media and using convincing impersonations to bypass controls.

This reconnaissance phase limits the search space and algorithms in the form of machine learning password crawlers are then applied to guess credentials in a matter of seconds. These AI-augmented attacks need AI-based solutions to counter them. Bot management defence systems use rate-limiting in combination with an IP reputation database to stop malicious bots from making login attempts without impacting legitimate logins.

A major facilitator behind credential abuse is simply a gap in users’ behaviour

One example of a defence mechanism is the Cloudflare Bot Management, which uses machine learning algorithms to collect data from over 400 billion requests routed through the Cloudflare network each day, identifying and stopping credential-stuffing bots with very high accuracy.

But let’s keep things in perspective: although AI-powered algorithms can be an efficacious tool within the attackers’ arsenal, these algorithms are largely used for Distributed Denial of Service or cryptocurrency calculations.

A major facilitator behind credential abuse is simply a gap in users’ behaviour, otherwise known as “intellectual laziness”—using the same password for several applications. Many of us do this because one or two passwords are easier to remember. According to TeleSign, 71% of users use the same passwords for multiple accounts. There have been approximately 360 breaches in the past five years, resulting in three billion accounts and 550 million unique passwords being leaked.

While using a strong password, or pass-phrase, provides a solid protection against Brute Force attacks, it offers little protection against credential stuffing if the password or pass-phrase is shared across several accounts.

External and internal threats

Where does this threat come from? According to the Data Breach Investigations Report 2020, external attackers were responsible for the majority (70%) of stolen data, compared with 30% insider threats.

The only sector with a bigger insider problem, according to DBRI, is the healthcare sector, where the split is nearly 50-50 between external and insider attacks. Malicious issues in healthcare include simple human error and employee misuse, such as medical workers accessing patients’ records out of curiosity.

So what can boards do to prevent this?

The first step in developing resilience protection against credential abuse is education. This requires a commitment from the board to continuous training and staff development programmes that nurture higher levels of cyber hygiene among employees, clients and other stakeholders within the supply chain.

Credential stuffing can happen as a result of a compromise at other organisations, suppliers or partners

Simple steps like using strong pass-phrases and not repeating them across multiple access points will help reduce the threat. IT departments, and security teams also need to take necessary steps to ensure that the IT infrastructure is as secure an environment as possible for employees to operate in.

Detection tools and processes need to be in place to identify any possible credential-stuffing attacks at the earliest opportunity. This is important because stolen credentials are rarely ever used immediately. Attackers require time to analyse the data they capture before exploiting it. This means that the faster an organisation can detect an attack, the better position it is in to reduce or nullify its impact.

One of the biggest challenges that organisations face stems from the fact that the source of their problem is not necessarily entirely within their control. Credential stuffing can happen as a result of a compromise at other organisations, suppliers or partners which don’t have high-level defence systems or protocols in place.

No organisation, or individual for that matter, is immune from this kind of attacks. Large corporates may be able to afford stronger technology infrastructure and better staff training programmes. But this is a continuous battle that requires constant vigilance in pro-rata, depending on whether it’s an individual user, an SME or a large organisation.

Professor Kamal Bechkoum is head of the school of computing and engineering at the University of Gloucestershire.

  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Mail

Related Posts

  • Cyber criminals chase ransomware insurance money
    April 18, 2023
    ransomware insurance

    Specialist ransomware criminals are investigating victims’ insurance capacity—sometimes by blatantly asking companies outright.

  • Experts urge vigilance on cybersecurity amid Russian invasion of Ukraine
    February 28, 2022
    Russian flag in code

    UK and US cybersecurity agencies are among the specialists recommending that companies "bolster their defences" against cyber attacks.

  • Business concern over cyber attacks rises in wake of Ukraine conflict
    February 28, 2022
    Ukraine flag with coding

    Geopolitical uncertainty is leading firms to boost their defences against cyber attacks. But true digital resilience is a continuous process.

  • Technology, cyber risk and ESG top list of business leaders' concerns
    June 8, 2022
    Digital code on skycrapers

    Mazars survey reveals 82% of executives plan to increase investment in IT systems, while 75% plan to boost spending on sustainability.

Search


Follow Us

Most Popular

Featured Resources

wef global risks 2025

The Global Risks Report 2025

The 20th edition of the Global Risks Report reveals an increasingly fractured global...
Supply chain management cover

Strategic Oversight in Supply Chain Management: A Guide for Corporate Boards 2025

Supply chains have become complex, interdependent and opaque and—according to research...
OB-Cyber-Security

Cyber Security: What Boards Need to Know

Maintaining firewalls, protecting servers and filtering malicious emails rarely make...

C-suite barometer: outlook 2025 - UK insights

Forvis Mazars draws UK insights from its global study and looks at UK executives’...

The IA’S Principles Of Remuneration 2024 2025

This guidance from the Investment Association is aimed at assisting remuneration...
Diligent 2024 leadership tech cover

Leadership, decision-making & the role of technology: Business survey 2024

This research report by Board Agenda and Diligent sheds light on how board directors...

Director Reference Guide: Navigating Conflict in the Boardroom

The 'Director Reference Guide' on navigating conflict in the boardroom provides practical...
Nasdaq 2024 governance report cover

Nasdaq 2024 Global Governance Pulse

This Nasdaq survey gathered data from more than 870 board members, executives, and...

Becoming a non-executive director (4th edition)

Board composition is the subject of much debate, while the role of the non-executive...
art & science brainloop new cover

The Art & Science of Creating an Effective Board

Boards are coming under more scrutiny and pressure than ever before from regulators,...
SAA First time NED guide

First Time Guide for Non-Executive Directors

The role of the non-executive director has never been more vital: to advise, support,...

SUBSCRIBE TODAY

Stay current with a wide-ranging source of governance news and intelligence and apply the latest thinking to your boardroom challenges. Subscribe


  • Editors & Contributors
  • Editorial Advisory Board
  • Board Advisory & Corporate Services
  • Media Marketing Solutions
  • Contact Us
  • About Us
  • Board Director Network
  • Terms & Conditions
  • Privacy Policy
  • Cookies

Copyright © 2026 Questor Media Group Ltd.

  • Terms & Conditions
  • Privacy Policy