Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 31, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 31, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 31, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 31, 2025

      How to install SteamOS on ROG Ally and Legion Go Windows gaming handhelds

      May 31, 2025

      Xbox Game Pass just had its strongest content quarter ever, but can we expect this level of quality forever?

      May 31, 2025

      Gaming on a dual-screen laptop? I tried it with Lenovo’s new Yoga Book 9i for 2025 — Here’s what happened

      May 31, 2025

      We got Markdown in Notepad before GTA VI

      May 31, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Oracle Fusion new Product Management Landing Page and AI (25B)

      May 31, 2025
      Recent

      Oracle Fusion new Product Management Landing Page and AI (25B)

      May 31, 2025

      Filament Is Now Running Natively on Mobile

      May 31, 2025

      How Remix is shaking things up

      May 30, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      How to install SteamOS on ROG Ally and Legion Go Windows gaming handhelds

      May 31, 2025
      Recent

      How to install SteamOS on ROG Ally and Legion Go Windows gaming handhelds

      May 31, 2025

      Xbox Game Pass just had its strongest content quarter ever, but can we expect this level of quality forever?

      May 31, 2025

      Gaming on a dual-screen laptop? I tried it with Lenovo’s new Yoga Book 9i for 2025 — Here’s what happened

      May 31, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Account Credentials for Security Vendors Found on Dark Web

    Account Credentials for Security Vendors Found on Dark Web

    January 22, 2025

    security vendor account credentials found on dark web

    Account credentials from some of the biggest cybersecurity vendors can be purchased on dark web marketplaces, according to a Cyble report published today.

    While most of the security credentials Cyble found were for customers of those vendors – likely captured by infostealers that infected customer devices – there were also an alarming number of leaked account credentials from the security vendors themselves for sensitive internal accounts for enterprise, development and security systems.

    The accounts ideally should have been protected by multifactor authentication (MFA), which would have made exploiting the credentials more difficult, but Cyble noted that the leaked credentials show the importance of dark web monitoring as a defense against much bigger cyberattacks like data breaches and ransomware attacks.

    Security Company Credentials Can Be Bought for $10

    The credentials could be bought for as little as $10 in cybercrime marketplaces, Cyble said, noting that they were likely harvested from infostealer logs and then sold in bulk on dark web marketplaces.

    Cyble looked only at credentials leaked since the start of the year, as older passwords are more likely to have changed. Of the 14 cybersecurity vendors Cyble examined, each had both customer and internal credentials leaked on the dark web thus far in 2025.

    The vendors mainly offer enterprise and cloud security tools and services, but Sophos and Trend Micro also have large consumer businesses, and consumer-only McAfee was included too. The full list included:

    • CrowdStrike
    • Palo Alto Networks
    • Fortinet
    • Zscaler
    • SentinelOne
    • RSA Security
    • Exabeam
    • LogRhythm
    • Rapid7
    • Trend Micro
    • Sophos
    • McAfee
    • Qualys
    • Tenable

    Most of the credentials found by Cyble appeared to be customer credentials that protect access to security management and account interfaces, but all the security vendors Cyble examined had access to internal systems leaked on the dark web too.

    Security vendor credentials found by Cyble included some for sensitive internal systems such as Okta, Jira, GitHub, AWS, Microsoft Online, Salesforce, SolarWinds, Box, WordPress, Oracle and Zoom, plus other password managers, authentication systems and device management platforms.

    Cyble said it didn’t test to see if the credentials were valid, but noted that many were for “easily accessible web console interfaces, SSO logins and other web-facing account access points.”

    McAfee had more than 600 credential leaks so far this year, largely for consumers’ account access credentials, “likely harvested from infostealer attacks on the consumers’ personal devices.”

    CrowdStrike had more than 300 credential leaks, including for high-tech, pharmaceutical and financial customer accounts, while Palo Alto Networks had nearly 400 exposures. Palo Alto was one of the vendors with more sensitive internal company counts exposed, with company email addresses “listed among the credentials for a number of sensitive accounts, including developer and product account interfaces and customer data.”

    “Depending on the privileges granted to those accounts, the exposure could be substantial,” Cyble noted.

    Dark Web Credential Leaks a Boon for Hackers

    Besides the obvious hacking potential, Cyble noted that exposed accounts could also help threat actors conduct reconnaissance “by giving them an idea of the systems that a potential target uses, including locations of sensitive data and potential vulnerabilities to exploit. Other sensitive information exposed by infostealers could include URLs of management interfaces that are unknown to the public, giving further recon information to hackers.”

    Cyble concluded that “If the largest security vendors can be hit by infostealers, so can any organization, making basic cybersecurity practices like MFA, zero trust, vulnerability management and network segmentation important for minimizing – and ideally preventing – data breaches, ransomware and other cyberattacks.”

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleEmpower Financial Services Developers with the Document Model
    Next Article Trump Terminates DHS Advisory Committee Memberships, Disrupting Cybersecurity Review

    Related Posts

    Security

    New Apache InLong Vulnerability (CVE-2025-27522) Exposes Systems to Remote Code Execution Risks

    May 31, 2025
    Security

    New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

    May 31, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Debugging and Profiling Linux Applications with GDB and strace

    Learning Resources

    CVE-2025-40624 – TCMAN’s GIM SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Real-World Wins: Case Studies of Businesses Thriving with AI📊

    Web Development

    5 Thoughts on SUGCON Europe 2024 in Dublin, Ireland

    Development

    Highlights

    Development

    Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users’ Actions

    March 17, 2025

    Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to style and format…

    Tips for building top performer teams

    April 1, 2025

    Better CSS Shapes Using shape() — Part 2: More on Arcs

    May 30, 2025

    browser.getGeoLocation() is not working webdriver io

    December 27, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.