
Phishing Has Evolved: Why Compromised Accounts Are the Biggest Threat to Your Business
The days of spotting a phishing email by simply looking for misspelled words and suspicious sender addresses are quickly coming to an end. Cybercriminals are adopting a far more sophisticated and dangerous tactic: launching attacks from legitimate, compromised email accounts. This evolution represents one of the most significant shifts in the cybersecurity landscape, leaving businesses more vulnerable than ever.
Instead of creating fake domains or spoofing addresses, threat actors are now focusing their efforts on account takeover (ATO). By stealing the credentials to a real employee’s or partner’s email account—often through an initial, simpler phishing attack—they gain a trusted foothold inside your digital perimeter.
Once they control a legitimate account, their malicious emails bypass nearly every traditional security check, making them incredibly difficult to detect.
Why This New Method Bypasses Traditional Defenses
The effectiveness of using compromised accounts for phishing lies in its ability to exploit both technology and human psychology. Here’s why these attacks are so successful:
- They Come from a Trusted Source: When an email arrives from a known colleague, manager, or trusted vendor, our guard is naturally down. The message originates from a legitimate server and a familiar address, making it seem authentic at first glance.
- They Defeat Standard Email Authentication: Security protocols like SPF, DKIM, and DMARC are rendered useless. These tools are designed to verify that an email is coming from the server it claims to be from. In an account takeover scenario, it is coming from the legitimate server, so it passes these technical checks with flying colors.
- They Leverage Existing Relationships: Attackers can spend days or even weeks lurking within a compromised inbox. They study communication patterns, learn project details, and understand internal jargon. This allows them to craft highly convincing messages that reference real conversations and projects, making their fraudulent requests seem perfectly normal.
- They Facilitate Deeper Infiltration: A compromised internal account is the perfect launchpad for more severe attacks. From this trusted position, criminals can send malware to other employees, execute Business Email Compromise (BEC) schemes to reroute payments, or exfiltrate sensitive company data without raising immediate alarms.
The Anatomy of a Compromised Account Attack
Understanding the lifecycle of this threat can help you recognize the warning signs. A typical attack unfolds in several distinct stages:
- Initial Compromise: The attacker gains access to a single account, often through password spraying, credential stuffing from other data breaches, or a successful traditional phishing lure.
- Silent Reconnaissance: The criminal logs into the account and monitors email traffic. They identify key personnel, ongoing financial transactions, and the overall tone and style of communication. They may also set up inbox rules to auto-delete their own sent messages to cover their tracks.
- Weaponized Communication: After gathering sufficient intelligence, the attacker strikes. They send a carefully crafted email from the compromised account. This could be a fake invoice to the accounting department, an urgent wire transfer request to a finance manager, or a link to a “secure document” that leads to a credential harvesting page.
- Execution and Expansion: If the recipient falls for the bait, the attacker achieves their goal—be it financial theft, credential harvesting, or malware deployment. They often use newly stolen credentials to compromise more accounts, expanding their access across the organization.
How to Protect Your Organization from This Evolving Threat
Defending against attacks from trusted sources requires a multi-layered security strategy that moves beyond traditional email filtering. Protecting your business requires a proactive and vigilant approach.
Here are essential, actionable steps you can take today:
- Enforce Multi-Factor Authentication (MFA): This is the single most effective defense against account takeover. Even if a cybercriminal steals a password, they cannot access the account without the second verification factor (like a code from an app or a text message). Make MFA mandatory for all employees, without exception.
- Elevate Security Awareness Training: Your team is your last line of defense. Training must evolve to teach employees to be skeptical of the content and context of a request, not just the sender’s address. Encourage them to question unusual urgency, changes in payment details, and requests that seem out of character, even if they come from a known contact. Promote a culture of verifying sensitive requests through a secondary channel, like a phone call.
- Deploy Advanced Email Security Solutions: Modern security platforms use AI and machine learning to analyze email content and identify behavioral anomalies. These tools can flag emails that have a suspicious intent or an unusual tone, even if they pass all technical authentication checks.
- Actively Monitor for Suspicious Account Activity: Implement systems that can detect and alert on impossible travel (e.g., logins from two different continents in one hour), unusual inbox rule creation (like auto-forwarding to an external address), and mass email deletions.
- Adopt a Zero-Trust Security Model: The core principle of a zero-trust framework is “never trust, always verify.” This means treating every request and access attempt as a potential threat, regardless of whether it originates from inside or outside your network.
The threat landscape is dynamic, and as phishing evolves, so must our defenses. By understanding that the danger can now come from within, organizations can build a more resilient security posture prepared for the sophisticated attacks of today and tomorrow.
Source: https://blog.talosintelligence.com/ir-trends-q2-2025/