ICT Security : Make Your Information Hard to Steal
Dear Campus Community,
Credential Leak
What?
A credential leak occurs when sensitive information, such as usernames, passwords, and API keys, is exposed to the public.
How?
This can happen in any number of ways, including data breaches, phishing attacks, credential stealers, and social engineering.
Consequences
Leaked credentials can be used by attackers to gain unauthorized access to your organization's systems and data. This can lead to data theft, financial losses, and reputational damage.
Credential Stealers
Malicious software (malware) continues to evolve, with various types targeting sensitive data for financial gain.
Stealers are a type of malware that target sensitive data, including login credentials, payment information, personal documents, and more.
Stealers are commonly delivered through phishing emails, malicious websites, or compromised software downloads.

