Home
Blog
How Identity-Based Attacks Compromise Organizations

How Identity-Based Attacks Compromise Organizations

Hwei Oh
08/21/2025
Share this article:

Identity-based attacks are becoming an increasingly common way to compromise organizations. Hackers steal IDs, compromise individual accounts and devices, or use other methods to hack into individual accounts so they can infiltrate an organization more deeply.

Identity-based attacks have become so prevalent that one report even states three out of four cyberattacks depend on credentials rather than on malware.

The reason for this is simple. Regardless of how locked down your network is, an authenticated user has free rein inside that network, which is why security leaders must pay attention to this trend.

Credential theft and other ID-based attacks aren’t only a matter of personal risk. They directly apply to an organization’s security posture.

Here’s how ID-based attacks can impact companies.  

Examples of how identity-based attacks affect organizations

Many identity-based attacks look like they only risk the individual being targeted. However, the scope of an ID-based attack can quickly escalate to cause an organizational compromise.

For example, credential stuffing and brute-force attacks are common ways that hackers use to infiltrate businesses. Sixty-five percent of people reuse passwords across multiple websites. Cybercriminals not only know this, but they rely on it to successfully compromise high-value targets.

In 2025, credential stuffing led to attacks on Cartier and clothing company The North Face. In 2012, Dropbox was hacked because an employee reused their LinkedIn password, leading to 68 million leaked email addresses. Other corporate victims of credential stuffing include JPMorgan Chase, Gawker, and Yahoo.

2FA and MFA can mitigate these kinds of attacks, but they’re not a silver bullet. “Alert Fatigue” can quickly set in—a condition where a user receives so many MFA notifications that they eventually give in and authorize one of the requests. Users will either do this knowingly, in the belief that some error is creating the incessant MFA requests; or unknowingly, such as by mistakenly clicking OK in the confusion of all their other notifications.

MFA fatigue is what allowed hackers to gain access to Uber’s systems in 2022.

MiTM/Interception attacks

Another ID-based attack vector is the Man-in-the-Middle (MiTM) attack. MitM attacks can enable identity-based attacks by intercepting communications to steal credentials or session tokens.

The increase in the use of encryption has made these attacks more challenging to execute, but hackers have likewise increased their level of sophistication.

If employees are using company devices, a MitM attack would effectively give the hacker access to any resource that the devices are authenticated to use.

Attackers are aware that the easiest way to access an organization’s resources is through an individual compromise. The more valuable the target, the more effort an attacker will put into breaching it.

For example, instead of using general phishing campaigns, hackers might use more targeted spear phishing and BEC (business email compromise) campaigns to try to steal credentials. They might try to penetrate an individual’s device directly or an executive’s personal cloud storage account. Such compromises often lead to deeper infiltrations.

Many identity-based attacks exploit human error

Verizon’s latest Data Breach Investigation Report (DBIR), a highly comprehensive cybersecurity report published annually, states that the “human element” is present in about 60% of all data breaches. The human element includes credential theft, breaches from social actions, and human error.

The report also states that engineering errors are present in 23% of all data breaches. But, in all fairness to the cybersecurity industry, the technology and tools for protecting assets are incredibly effective. It’s rare to hear of hacks getting through any properly robust cybersecurity posture. We don’t know of even one recent major attack that didn’t include some form of human error.

Hackers know this, and therefore humans remain their primary target. The more valuable the potential booty, the more targeted the attacks become, such as in spear phishing and BEC attacks.

AI is making it easier to manipulate humans because hackers can now easily create well-worded and compelling emails with only a prompt. They can also generate lifelike images of real people. These tools lower the barrier to entry for hackers and make it more likely that end users will believe a phishing website designed to steal credentials.

The AI problem is made worse if employees aren’t aware of it, which is why it’s essential to educate employees about the risks.

Sophisticated Active Directory attacks

Microsoft Active Directory (AD) is prone to sophisticated ID-based attacks that can give an attacker deep access to your company’s network, potentially leading to an APT (advanced persistent threat).

These types of attacks focus on Kerberos, the authentication protocol used in AD. The Kerberos protocol was developed at MIT in the 1980s and is named after the Greek mythological creature Cerberus, which guarded the gates of the Underworld. The name is a nod to Kerberos’s functionality as the network’s protector.

Unfortunately, the Kerberos protocol can be compromised, notably through three methods:

  • Kerberoasting
  • Silver ticket
  • Golden ticket

At a high level, Kerberos functions as a “ticket” system, much like a ticket gives you access to an event. It uses symmetric key cryptography to do the initial authentication, then issues a “ticket” to the authenticated user. Once users have this ticket, they can request additional tickets to access specific services on the network for which they’re authorized.

Kerberoasting exploits the system by first getting access to a low-privileged user’s account, such as through phishing. The hacker then queries the Kerberos protocol for access tickets for each service. The Kerberos system provides these, even if the user doesn’t have access. The tickets contain hashed authentication data, which the hacker removes and then, using an offline tool, decrypts through brute force to obtain credentials for a user with higher privileges.

Yes, it’s technical, but all you really need to know is that the problem exists. The solution is to insist on complex passwords so that brute force attacks become useless. The other solution is to educate users about phishing so they don’t inadvertently give away credentials. Even getting credentials from a low-privileged user can open the door to obtaining credentials for users with higher privileges.

The Silver Ticket and Golden Ticket attacks consist of forging a ticket that gives the user access to one service (Silver Ticket) or all services (Golden Ticket) on the network.

All three attacks can lead to an APT, where hackers start to move laterally through an organization, gaining access to deeper levels of information to exfiltrate as they go.

Organizations should prioritize protecting against identity-based attacks

Identity-based attacks are growing in popularity because they’re effective and work across multiple vectors. They can work by compromising an employee’s account directly or one of their devices. They often rely on tried-and-tested methods such as phishing and social engineering.

They can also be highly sophisticated, as in AD-based attacks like Kerberroasting.

ID-based threats are evolving rapidly. Security leaders should therefore create proactive solutions that blend technology, awareness, and policies.

A suggested approach would focus on:

  • Catching attacks before they can do any damage.
  • Minimizing the risk of employees succumbing to phishing and social engineering through regular training and phishing simulation tests.
  • Ensuring employee permissions and roles are limited so hackers can’t gain access to all systems.
  • Maintaining a robust AD system to minimize Kerberroasting and other AD exploits. This includes having a strong password policy in place.

SolCyber can help with all these aspects, lowering the load on your cybersecurity team significantly. To find out more about SolCyber’s outsourced cybersecurity services, check out our website or reach out to us directly for more info.

Photo by Arthur Mazi on Unsplash

Avatar photo
Hwei Oh
08/21/2025
Share this article:

Table of contents:

The world doesn’t need another traditional MSSP 
or MDR or XDR.

What it requires is practicality and reason.

Choose identity-first managed security.

We start with identity and end with transparency — protecting where attacks begin and keeping you informed, with as much visibility as you want. No black boxes, just clear, expert-driven security.
No more paying for useless bells and whistles.
No more time wasted on endless security alerts.
No more juggling multiple technologies and contracts.

Follow us!

Subscribe

Join our newsletter to stay up to date on features and releases.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

©
2025
SolCyber. All rights reserved
|
Made with
by
Jason Pittock

I am interested in
SolCyber XDR++™

I am interested in
SolCyber MDR++™

I am interested in
SolCyber Extended Coverage™

I am interested in
SolCyber Foundational Coverage™

I am interested in a
Free Demo

12448