All Posts
Cybersecurity

Hackers Are Logging In With Your Employees' Stolen Passwords

· Infonaligy

Infostealers harvest saved passwords from personal devices, and a single reused credential can give ransomware groups direct access to your company network.

Hackers Are Logging In With Your Employees' Stolen Passwords

One of your employees reused their work email password on a personal shopping site. That site got breached six months ago, and the password is now listed in a credential database sold on a dark web marketplace for under $10. An attacker buys it, logs into your company’s VPN at 2 AM on a Sunday, and starts exfiltrating data. No malware was deployed. No alarms fired. Every security tool saw a legitimate login from a valid account.

This is how the majority of ransomware attacks begin in 2026. According to Huntress’s 2026 ransomware trends report, credential theft has overtaken technical exploitation as ransomware groups’ preferred entry method. Attackers aren’t looking for zero-day vulnerabilities in your firewall. They’re buying your employees’ stolen passwords in bulk.

This is the second post in a two-part series on blind spots in business security. The first post covers how attackers use your own IT tools against you through living-off-the-land techniques that bypass traditional antivirus. This post focuses on the human side: how credentials get stolen, why they’re so valuable, and what actually stops the attack chain.

How Infostealers Harvest Your Employees’ Work Passwords

Infostealer malware like RedLine, Raccoon, and Vidar doesn’t target your company’s network directly. It targets your employees’ personal devices. When someone downloads a cracked game, a browser extension from an unofficial source, or opens a malicious attachment on their home laptop, the infostealer silently scrapes every password saved in their browser. That includes any work credentials they’ve saved for convenience: VPN logins, Microsoft 365 accounts, CRM portals, cloud storage, email.

The malware runs once, collects everything, and sends it to a command-and-control server. The employee’s personal laptop might not even slow down. Within hours, those credentials appear in a “log” sold on Telegram channels and dark web marketplaces. Ransomware groups, including the LockBit-Qilin-DragonForce alliance, now share stolen credential databases across groups, which means a single employee’s compromised personal device can expose your business to multiple threat actors simultaneously.

The critical detail for business owners: your company’s endpoint protection, your firewall, your email filters never see any of this. The compromise happens entirely outside your security perimeter, on a device you don’t manage and can’t monitor.

Password Reuse Is the Multiplier

The reason stolen personal credentials become a business problem is password reuse. Surveys consistently show that the majority of people reuse passwords across multiple accounts. When an employee uses the same password for their personal email, a retail loyalty program, and their company’s Microsoft 365 account, a breach at any one of those services compromises all of them.

Attackers know this. They don’t manually try each stolen credential against random services. They run automated tools that test stolen username-password combinations against thousands of corporate login portals simultaneously. This technique, called credential stuffing, succeeds because so many people use the same password everywhere.

For a 100-person company, the math gets uncomfortable fast. If even 15% of employees reuse passwords between personal and work accounts, you have 15 potential entry points that no amount of network security can protect. The attacker doesn’t need to find a vulnerability in your infrastructure. They just need one valid login.

Why MFA Alone Doesn’t Close the Gap

Multi-factor authentication is essential and every business should have it enabled. But relying on standard MFA as your sole defense against credential theft creates a false sense of security, because attackers have adapted.

Adversary-in-the-middle (AiTM) attacks intercept the authentication process in real time. The attacker sets up a proxy server between the employee and the real login page. The employee enters their username, password, and MFA code as normal. The proxy passes everything through to the real service, captures the authenticated session cookie, and hands it to the attacker. From that point forward, the attacker has a fully authenticated session that bypasses MFA entirely. According to Hoxhunt’s 2026 BEC statistics, session hijacking surged 146% as attackers shifted to these techniques.

Callback phishing and dual-channel attacks add another layer. Computer Weekly reported that 66% of social engineering attacks now move to SMS and 32% to WhatsApp after initial email contact, creating attack chains that bypass email security entirely. An employee receives a professional-looking email, then a follow-up text message that appears to come from their IT department asking them to “verify” their login. The combination feels legitimate because two separate channels reinforce each other.

Standard MFA (push notifications, SMS codes, authenticator app codes) stops unsophisticated credential stuffing. It does not stop a motivated attacker with a stolen password and a phishing toolkit designed to intercept sessions. That distinction matters when you’re deciding how much to invest in credential protection.

One layer that does catch these attacks is active monitoring of login activity. A SOC team reviewing authentication logs around the clock spots the patterns that automated rules miss: credential stuffing attempts producing clusters of failed logins across multiple accounts, AiTM sessions where a successful login is immediately followed by activity from an impossible location, and session tokens reused from unrecognized devices. At Infonaligy, our SOC analysts review failed login attempts and session anomalies continuously, catching these patterns in the narrow window between the first suspicious authentication event and full account compromise.

What Actually Stops the Attack Chain

Preventing credential-based attacks requires addressing multiple points in the kill chain: reducing the number of passwords that exist, making stolen credentials harder to use, and detecting compromised credentials before attackers do.

Company-Managed Password Managers

The single most effective way to eliminate password reuse is to deploy a company-managed password manager to every employee. When each account has a unique, randomly generated password stored in a vault, stealing one password from a breached personal site doesn’t compromise anything else. Password managers also remove the temptation to save credentials in browsers, which is exactly where infostealers harvest them.

The key word is “company-managed.” Personal password manager accounts are better than nothing, but they don’t give your IT team visibility into whether employees are actually using unique passwords for work accounts. Enterprise plans from providers like 1Password, Bitwarden, or Keeper let administrators enforce policies, audit password health across the organization, and ensure new employees start with the tool from day one.

Phishing-Resistant MFA (FIDO2 and Passkeys)

FIDO2 security keys and passkeys are the most effective defense against AiTM attacks because they’re cryptographically bound to the legitimate service’s domain. When an attacker sets up a proxy phishing page, the security key or passkey simply refuses to authenticate because the domain doesn’t match. There’s nothing for the employee to decide and no code to intercept. The protocol itself prevents the attack.

Microsoft, Google, and Apple all support passkeys across their platforms now. For businesses running Microsoft 365, enabling FIDO2 security keys as a primary authentication method for admin accounts and high-value users is one of the highest-impact security investments available. Your managed security provider can help you plan a phased rollout that starts with privileged accounts and expands from there.

Dark Web Monitoring for Leaked Credentials

You can’t fix a compromised credential if you don’t know it’s been compromised. Dark Web monitoring continuously scans credential dumps, infostealer logs, and underground marketplaces for email addresses matching your company’s domains. When a match appears, your security team gets alerted and can force a password reset before the attacker uses it. This is one of the first services we deploy for clients at Infonaligy — automated scanning across breach databases and infostealer logs for any credentials tied to their domains, with immediate notification when compromised accounts surface.

This is reactive rather than preventive, but it addresses the reality that breaches at third-party services are outside your control. An employee’s personal account on a breached platform might have exposed their work email and a reused password months ago. Without monitoring, you’d never know until the attacker logs in. With Dark Web monitoring in place, you can often close the window between credential exposure and exploitation — forcing a password reset before the attacker ever attempts to use what they bought.

Single Sign-On to Reduce Password Sprawl

Every separate username and password an employee manages is another credential that could be stolen, reused, or phished. Single sign-on (SSO) consolidates authentication into one identity provider, which means employees have fewer passwords to manage and attackers have fewer credentials worth stealing.

SSO also makes it possible to enforce strong authentication policies uniformly. Instead of hoping every SaaS vendor in your stack supports MFA the same way, you enforce phishing-resistant MFA at the identity provider level and every connected application inherits that protection. For SMBs running Microsoft 365, Entra ID (formerly Azure AD) provides SSO capabilities that many organizations already have access to but haven’t configured.

Five Questions to Ask Your IT Provider This Week

If your business relies on an IT provider or managed security team, these questions will tell you whether your credential exposure is being addressed:

  1. Are you monitoring the dark web for our employees’ leaked credentials? If the answer is no, you have no visibility into whether stolen credentials are already circulating.
  2. Do we have phishing-resistant MFA or just standard MFA? Standard MFA (push notifications, SMS, authenticator codes) is vulnerable to AiTM attacks. FIDO2 keys and passkeys are not.
  3. Is there a company-managed password manager deployed to all employees? If employees are choosing and reusing their own passwords, the most expensive security stack in the world won’t stop a credential stuffing attack.
  4. Can our current tools detect a login from a stolen credential? Endpoint detection and SIEM platforms can flag anomalous logins (unusual times, locations, or devices), but only if they’re configured to monitor identity events.
  5. What happens when an employee’s personal device is compromised by an infostealer? If the answer involves a blank stare, that’s a gap worth closing. Security awareness training should specifically cover the risks of saving work passwords in personal browsers and reusing credentials across accounts.

Credential theft and AI-powered social engineering are converging. Stolen credentials give attackers the initial access. AI tools help them move laterally, escalate privileges, and launch convincing BEC attacks that trick employees into authorizing fraudulent transactions. Addressing credential hygiene isn’t just about preventing unauthorized logins. It’s about removing the foundation that makes every downstream attack possible.

Need Help With Credential Security?

Our team can help you assess your credential exposure, deploy phishing-resistant MFA, and monitor for leaked passwords before attackers use them.

Get a Free Assessment