{"id":7616,"date":"2026-03-19T09:15:00","date_gmt":"2026-03-19T09:15:00","guid":{"rendered":"https:\/\/www.securitytoday.de\/2026\/04\/02\/post_id-5412\/"},"modified":"2026-04-10T08:20:37","modified_gmt":"2026-04-10T08:20:37","slug":"identity-attacks-2026-why-hackers-no-longer-break-in-they-log-in","status":"publish","type":"post","link":"https:\/\/www.securitytoday.de\/en\/2026\/03\/19\/identity-attacks-2026-why-hackers-no-longer-break-in-they-log-in\/","title":{"rendered":"Identity Attacks 2026: Why Hackers No Longer Break In  &#8211;  They Log In"},"content":{"rendered":"<p style=\"display:inline-block;background:#69d8ed;color:#fff;padding:4px 14px;border-radius:20px;font-size:0.85em;margin-bottom:18px;\">3 min Reading Time<\/p>\n<p><strong>75 percent of all security incidents in 2026 stem from stolen identities, not technical exploits. A 50 percent increase in compromised credentials in the second half of 2025 compared to the previous year. Hackers aren\u2019t breaking in anymore. They\u2019re logging in. The paradigm shift from perimeter security to identity security is no longer a prediction. It\u2019s reality.<\/strong><\/p>\n<h2>TL;DR<\/h2>\n<ul>\n<li>\ud83d\udd12 75 percent of all breaches in 2026 occur via stolen identities. Hackers log in instead of breaking in (Cloudflare, 2026).<\/li>\n<li>\ud83d\udcc8 50 percent more compromised credentials in H2 2025 compared to the same period last year.<\/li>\n<li>\u26a0\ufe0f 97 percent of identity-based attacks use passwords as the initial entry vector.<\/li>\n<li>\ud83d\udee1\ufe0f Multi-factor authentication (MFA) alone is no longer sufficient: AiTM-Phishing (Adversary-in-the-Middle) systematically bypasses MFA.<\/li>\n<li>\ud83d\udd27 Solution: Passwordless authentication (Passkeys, FIDO2), continuous verification, and Identity Threat Detection and Response (ITDR).<\/li>\n<\/ul>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">Why Identities Are the New Battlefield<\/h2>\n<p>The 2026 Cloudflare report is clear: three out of four security incidents begin with a compromised identity. Not a buffer overflow, not a zero-day vulnerability  &#8211;  but valid login credentials that have fallen into the wrong hands. This trend has accelerated over the past two years. In the second half of 2025, 50 percent more credentials were compromised than in the same period in 2024.<\/p>\n<p>Heise recently headlined: \u201cLogin as a Weapon.\u201d The phrase captures the essence. An attacker with valid credentials appears to security systems as a legitimate user. They trigger no alarms, pass through firewalls and <a href=\"https:\/\/www.securitytoday.de\/en\/2026\/03\/13\/post_id-5360\/\" target=\"_blank\" rel=\"noopener\">network segmentation<\/a>, and access sensitive data. Only when they move laterally or exfiltrate data do they become visible  &#8211;  often too late.<\/p>\n<p>The recent <a href=\"https:\/\/www.securitytoday.de\/en\/2026\/03\/18\/microsoft-teams-a0backdoor-phishing-angriff-dns-tunneling\/\" target=\"_blank\" rel=\"noopener\">Microsoft Teams campaign involving A0Backdoor<\/a> exemplifies the pattern: initial access is achieved through social engineering, not a software exploit. Attackers exploit trust, not technical vulnerabilities.<\/p>\n<div class=\"evm-stat evm-stat-row\" style=\"display:flex;gap:16px;margin:32px 0;\">\n<div style=\"flex:1;text-align:center;background:#f0f9fa;border-radius:8px;padding:20px 12px;border-top:3px solid #69d8ed;\">\n<div style=\"font-size:28px;font-weight:700;color:#004a59;\">75 %<\/div>\n<div style=\"font-size:12px;color:#666;margin-top:4px;\">of all breaches via identities<\/div>\n<\/p><\/div>\n<div style=\"flex:1;text-align:center;background:#f0f9fa;border-radius:8px;padding:20px 12px;border-top:3px solid #69d8ed;\">\n<div style=\"font-size:28px;font-weight:700;color:#004a59;\">+50 %<\/div>\n<div style=\"font-size:12px;color:#666;margin-top:4px;\">more compromised credentials (H2 2025)<\/div>\n<\/p><\/div>\n<div style=\"flex:1;text-align:center;background:#f0f9fa;border-radius:8px;padding:20px 12px;border-top:3px solid #69d8ed;\">\n<div style=\"font-size:28px;font-weight:700;color:#004a59;\">97 %<\/div>\n<div style=\"font-size:12px;color:#666;margin-top:4px;\">use passwords as entry point<\/div>\n<\/p><\/div>\n<\/div>\n<div style=\"font-size:11px;color:#888;text-align:center;margin-top:-20px;margin-bottom:24px;\">Sources: Cloudflare 2026, Heise Online (March 2026)<\/div>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">Why MFA Is No Longer Enough<\/h2>\n<p>For years, multi-factor authentication (MFA) was the standard defense against credential theft. But 2025 and 2026 show: MFA is no longer a protective wall, but an obstacle that organized attackers systematically bypass. The tool? AiTM-Phishing (Adversary-in-the-Middle).<\/p>\n<p>In an AiTM attack, the attacker positions themselves between the user and the authentication server. The user enters their password and second factor  &#8211;  but instead of reaching the real server, the data goes to the attacker. The attacker captures the session cookies and gains authenticated access. To the server, everything appears normal.<\/p>\n<p>The EvilProxy phishing kit has industrialized AiTM attacks. Available as a service, it requires no technical expertise and is actively used against Microsoft 365 environments. <a href=\"https:\/\/www.securitytoday.de\/en\/2026\/03\/15\/post_id-5311\/\" target=\"_blank\" rel=\"noopener\">Regulated industries<\/a>, which rely on MFA as a primary control, must reevaluate this assumption.<\/p>\n<blockquote style=\"border-left:4px solid #69d8ed;margin:32px 0;padding:20px 24px;background:#fafafa;border-radius:0 8px 8px 0;font-size:1.1em;line-height:1.6;color:#333;\"><p>\n\u201cThe shift from network-based to identity-based attacks is the most significant change in the threat landscape since the rise of ransomware.\u201d<br \/>\n<cite style=\"display:block;margin-top:12px;font-size:0.8em;color:#888;font-style:normal;\">Cloudflare Security Report 2026, Executive Summary<\/cite>\n<\/p><\/blockquote>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">The Path to Passwordless: Passkeys and FIDO2<\/h2>\n<p>The response to identity-based attacks isn\u2019t stronger MFA  &#8211;  it\u2019s eliminating the attack vector itself: the password. Passwordless authentication using Passkeys and FIDO2 makes credential theft technically impossible, because there are no transferable credentials left to steal.<\/p>\n<p>Passkeys use asymmetric cryptography: the private key never leaves the user\u2019s device. Even during a phishing attack, there\u2019s nothing for an attacker to intercept and reuse. Google, Microsoft, and Apple have natively supported Passkeys in their operating systems since 2024.<\/p>\n<p>For enterprises, the transition requires effort: identity providers must support FIDO2, end-user devices must be compatible, and employees need training. But the ROI is clear: if 97 percent of identity-based attacks rely on passwords, passwordless authentication eliminates 97 percent of that attack surface.<\/p>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">ITDR: The New Category in Identity Security<\/h2>\n<p>Alongside passwordless, a new product category is emerging: Identity Threat Detection and Response (ITDR). ITDR solutions don\u2019t monitor network traffic  &#8211;  they analyze identity behavior. They detect anomalies such as: a user logging in simultaneously from two countries, a service account suddenly accessing data it has never accessed before, or a login from an unknown device at an unusual time.<\/p>\n<p>Gartner predicts that by 2027, ITDR will be a mandatory component in every enterprise security stack. The challenge: ITDR is only as effective as the data quality of the identity systems. Organizations that haven\u2019t <a href=\"https:\/\/www.securitytoday.de\/en\/2026\/03\/11\/post_id-5351\/\" target=\"_blank\" rel=\"noopener\">hardened Active Directory<\/a> won\u2019t get clean signals, even with ITDR.<\/p>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">5 Immediate Actions for Security Teams<\/h2>\n<ol>\n<li><strong>Plan a Passkey rollout:<\/strong> Verify whether your identity provider (Entra ID, Okta, Ping) supports FIDO2\/Passkeys. Define a pilot group. Goal: eliminate passwords for privileged accounts by Q3 2026.<\/li>\n<li><strong>Enforce AiTM-resistant MFA:<\/strong> Require phishing-resistant MFA methods (FIDO2, Windows Hello) for all admin and C-level accounts. SMS and app-based OTPs are not AiTM-resistant.<\/li>\n<li><strong>Implement session token hygiene:<\/strong> Shorten token lifetimes, tighten Conditional Access Policies (geolocation, device compliance, risk-based), and enable Continuous Access Evaluation.<\/li>\n<li><strong>Evaluate ITDR:<\/strong> Assess whether your current security architecture can detect identity-based anomalies. If not, evaluate ITDR solutions (CrowdStrike, Microsoft Defender for Identity, SentinelOne).<\/li>\n<li><strong>Monitor credential exposure:<\/strong> Set up dark web monitoring for compromised corporate credentials. Regularly check your domains against breach databases (Have I Been Pwned, SpyCloud).<\/li>\n<\/ol>\n<h2 style=\"margin-top:64px;margin-bottom:20px;padding-top:16px;\">Conclusion: The Firewall of the Future Is Identity<\/h2>\n<p>The paradigm shift is complete. The perimeter firewall no longer protects when the attacker logs in with valid credentials. The response is threefold: Passkeys eliminate the attack vector, AiTM-resistant MFA secures the transition period, and ITDR detects attackers who slip through anyway. Security teams that in 2026 still primarily invest in network security are investing in the wrong front line.<\/p>\n<h2>Frequently Asked Questions<\/h2>\n<h3>What exactly are identity-based attacks?<\/h3>\n<p>Attacks that use stolen or compromised credentials (username + password, session tokens, API keys) to impersonate legitimate users. Unlike technical exploits (buffer overflow, SQL injection), no software vulnerability is exploited  &#8211;  instead, the attacker abuses the trust of the authentication system.<\/p>\n<h3>Why is MFA no longer effective against phishing?<\/h3>\n<p>AiTM-Phishing (Adversary-in-the-Middle) inserts a proxy between the user and the authentication server. The user enters their password and second factor, and the attacker captures the session cookies. Result: the attacker is fully authenticated  &#8211;  even with MFA. Only phishing-resistant methods (FIDO2, Passkeys) are immune.<\/p>\n<h3>What are Passkeys and why are they more secure?<\/h3>\n<p>Passkeys use asymmetric cryptography: the private key remains on the user\u2019s device and never leaves it. During login, a cryptographic proof is generated  &#8211;  no password is transmitted. Even in a phishing attack, there\u2019s nothing for the attacker to intercept and reuse.<\/p>\n<h3>What is ITDR?<\/h3>\n<p>Identity Threat Detection and Response (ITDR) is a new category of security solutions that detect anomalies in identity behavior: simultaneous logins from different countries, unusual access times, sudden privilege escalations. ITDR adds the identity dimension to EDR and SIEM.<\/p>\n<h3>Which industries are most at risk?<\/h3>\n<p>Financial institutions and healthcare organizations are the primary targets of identity-based attacks due to their highly sensitive data and widespread use of Microsoft 365. But any organization with more than 100 employees and cloud services is a potential target.<\/p>\n<div class=\"evm-styled-box\" style=\"background:#f0f9fa;border-radius:8px;padding:20px 24px;margin:24px 0;border-top:3px solid #69d8ed;\">\n<h2 style=\"margin-top:0;margin-bottom:12px;font-size:1.05em;\">Editor\u2019s Reading Recommendations<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.securitytoday.de\/en\/2026\/03\/18\/microsoft-teams-a0backdoor-phishing-angriff-dns-tunneling\/\" target=\"_blank\" rel=\"noopener\"><strong>Attack via Microsoft Teams: A0Backdoor<\/strong><\/a>  &#8211;  A current example of identity-based attacks (SecurityToday)<\/li>\n<li><a href=\"https:\/\/www.securitytoday.de\/en\/2026\/03\/11\/post_id-5351\/\" target=\"_blank\" rel=\"noopener\"><strong>Hardening Active Directory: 5 Immediate Measures<\/strong><\/a>  &#8211;  The foundation of identity security (SecurityToday)<\/li>\n<li><strong>Cloud-native Identity: OAuth 2.1 and Passkeys<\/strong>  &#8211;  Technical deep dive (cloudmagazin)<\/li>\n<\/ul>\n<\/div>\n<div style=\"background:#f0f9fa;border-radius:8px;padding:20px 24px;margin:24px 0;border-top:3px solid #69d8ed;\">\n<h2 style=\"margin-top:0;margin-bottom:12px;font-size:1.05em;\">More from the MBF Media Network<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.digital-chiefs.de\/cio-ki-governance-kompromiss-logicalis-report-2026\/\" target=\"_blank\" rel=\"noopener\"><strong>CIOs Under Pressure: The AI Governance Crisis<\/strong><\/a>  &#8211;  IT leadership and risk (Digital Chiefs)<\/li>\n<li><a href=\"https:\/\/mybusinessfuture.com\/ki-paradox-deutschland-deloitte-studie-roi-transformation-2026\/\" target=\"_blank\" rel=\"noopener\"><strong>The German AI Paradox: Deloitte Study<\/strong><\/a>  &#8211;  Investments Without Transformation (MyBusinessFuture)<\/li>\n<\/ul>\n<\/div>\n<p style=\"text-align:right;\"><em>Header Image Source: Tima Miroshnichenko \/ Pexels<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"3 min Reading Time 75 percent of all security incidents in 2026 stem from stolen identities, not technical exploits. A 50 percent increase in compromised credentials in the second half of 2025 compared to the previous year. Hackers aren\u2019t breaking in anymore. They\u2019re logging in. The paradigm shift from perimeter security to identity security is [&hellip;]","protected":false},"author":55,"featured_media":5411,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"identity attacks","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"Identity attacks 2026: Stop hackers who log in, not break in. Protect against 75% of breaches from stolen credentials. Learn how to defend now.","_yoast_wpseo_meta-robots-noindex":"","_yoast_wpseo_meta-robots-nofollow":"","_yoast_wpseo_meta-robots-adv":"","_yoast_wpseo_canonical":"","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_opengraph-image":"","_yoast_wpseo_opengraph-image-id":0,"_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_yoast_wpseo_twitter-image":"","_yoast_wpseo_twitter-image-id":0,"footnotes":""},"categories":[251],"tags":[],"class_list":["post-7616","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"wpml_language":"en","wpml_translation_of":5412,"_links":{"self":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/7616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/comments?post=7616"}],"version-history":[{"count":3,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/7616\/revisions"}],"predecessor-version":[{"id":10167,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/7616\/revisions\/10167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/media\/5411"}],"wp:attachment":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/media?parent=7616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/categories?post=7616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/tags?post=7616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}