⚡ Key Takeaways

  • Actionability: High — Concrete steps: deploy FIDO2, monitor credentials, reduce session lifetime, adopt ITDR
  • Timeliness: Breaking — Sophos and Mandiant 2026 reports both confirm identity as dominant attack vector
  • Key Stakeholders: CISOs, IAM Teams, SOC Analysts, IT Directors

Bottom Line: Stolen credentials cost $4.81M per breach. Phishing-resistant MFA, credential monitoring, and continuous session validation are now mandatory — not optional.

Read Full Analysis ↓

Advertisement

🧭 Decision Radar

Relevance for Algeria
High — Algerian enterprises face the same credential reuse and MFA bypass risks as global organizations, compounded by smaller security teams

High — Algerian enterprises face the same credential reuse and MFA bypass risks as global organizations, compounded by smaller security teams
Infrastructure Ready?
Partial — MFA adoption is growing but phishing-resistant FIDO2 deployment is minimal; UEBA and ITDR tools are rare in Algerian enterprises

Partial — MFA adoption is growing but phishing-resistant FIDO2 deployment is minimal; UEBA and ITDR tools are rare in Algerian enterprises
Skills Available?
Partial — Identity security specialization is scarce; general cybersecurity professionals need upskilling in identity threat detection

Partial — Identity security specialization is scarce; general cybersecurity professionals need upskilling in identity threat detection
Action Timeline
Immediate

Immediate
Key Stakeholders
CISOs, identity and access management teams, SOC analysts, IT directors
Decision Type
Strategic

This article provides strategic guidance for long-term planning and resource allocation.

Quick Take: Algerian organizations should prioritize phishing-resistant MFA (FIDO2/passkeys) over traditional push-notification MFA, implement credential monitoring for corporate domains, and begin building identity threat detection capabilities — even basic UEBA rules on existing SIEM platforms provide meaningful uplift.

///

The numbers are unambiguous. According to the 2026 Sophos Active Adversary Report, 67% of all incidents investigated were rooted in identity-related attacks. Mandiant’s M-Trends 2026 report confirms that stolen credentials overtook phishing as the second most common initial access vector. And the aggregate data across multiple industry reports shows that 65% of initial access in breaches is driven by identity-based techniques, with nearly 90% of incidents tracing back to an identity-related element as a critical factor. Stolen credentials cost organizations an average of $4.81 million per breach. Despite years of investment in multi-factor authentication, identity security remains the most exploited attack surface in enterprise environments.

Why Credentials Still Dominate

The persistence of credential-based attacks defies the expectation that MFA and zero trust architectures would solve the problem. Three structural factors explain why:

Credential reuse is endemic. Despite password manager adoption growing, most users still reuse passwords across services. When a consumer database breach exposes credentials, attackers test those credentials against corporate VPNs, SaaS applications, and cloud consoles. The success rate is alarmingly high because the human habit of password reuse has not changed at the rate that security tooling has evolved.

MFA is no longer a reliable defense. Adversary-in-the-middle (AiTM) phishing toolkits like EvilProxy and Evilginx now proxy authentication sessions in real time, capturing both passwords and MFA tokens simultaneously. The Palo Alto Networks Unit 42 Global Incident Response Report found that identity-based phishing (22%) and social engineering (11%) remain leading breach drivers, with attackers increasingly focused on MFA circumvention and session hijacking. MFA fatigue attacks — where attackers bombard users with push notifications until they approve one — continue to succeed.

Session tokens replace credentials post-authentication. Modern attacks increasingly target session tokens rather than credentials themselves. Once a user authenticates, the session token becomes the new credential. Infostealer malware harvests these tokens from browsers, and attackers replay them to bypass authentication entirely. The token is valid, the session appears legitimate, and security tools see an authenticated user.

The Anatomy of an Identity-Based Breach

The Sophos Active Adversary Report details a typical identity breach chain:

  1. Initial access: Compromised credentials from a previous breach or purchased on dark web markets
  2. Valid account usage: Attacker logs in through the front door using legitimate credentials — no exploit, no malware
  3. Lateral movement: Using the compromised account’s permissions to access additional systems
  4. Privilege escalation: Discovering accounts with higher privileges, often through Active Directory enumeration
  5. Data exfiltration or ransomware deployment: Final objective achieved through legitimate-appearing activity

Over 90% of data breaches were enabled by misconfigurations or gaps in security coverage rather than novel exploits. The attacker does not need to hack anything. They log in.

Advertisement

What the Data Shows About Detection

The detection gap for identity-based attacks is significant. Because the attacker uses valid credentials, traditional security tools — firewalls, intrusion detection systems, endpoint protection — see authorized activity. The median dwell time for identity-based intrusions is longer than for malware-based attacks because the adversary blends in with normal user behavior.

Organizations that detect identity-based breaches faster share three characteristics:

  • User and Entity Behavior Analytics (UEBA): They monitor for anomalous login patterns — unusual hours, impossible travel, atypical resource access
  • Conditional access policies: They enforce context-aware authentication that considers device posture, location, and risk score
  • Continuous session validation: They verify sessions beyond initial authentication, revoking tokens when behavioral anomalies are detected

What Organizations Should Do

Deploy phishing-resistant MFA. FIDO2 hardware keys and passkeys are immune to AiTM proxy attacks because they bind authentication to the specific domain. Traditional SMS and push-notification MFA should be considered interim controls, not permanent solutions.

Implement credential monitoring. Subscribe to breach notification services and dark web monitoring for corporate email domains. When employee credentials appear in breach databases, force immediate password resets and session revocations.

Reduce session token lifetime. Shorter session durations limit the window during which stolen tokens are useful. For sensitive systems, implement continuous authentication that re-validates the user periodically rather than trusting a single login event.

Adopt identity threat detection and response (ITDR). ITDR platforms specifically monitor identity infrastructure — Active Directory, Entra ID, Okta — for the attack patterns that traditional security tools miss: credential spraying, golden ticket attacks, privilege escalation through group policy modifications.

Audit service accounts. Service accounts with static credentials and excessive privileges are among the most targeted assets. Implement just-in-time access, rotate credentials automatically, and monitor service account activity for deviation from expected behavior.

Key Takeaway

Authentication is not just one security control among many. It is the control. With 65% of breaches originating from identity-based attacks and credential theft costing $4.81 million per incident on average, identity security is the highest-leverage investment any organization can make. The shift from password-only to MFA was necessary but insufficient. The next step is phishing-resistant authentication, continuous session validation, and behavioral analytics that detect when legitimate credentials are used by illegitimate actors.

Follow AlgeriaTech on LinkedIn for professional tech analysis Follow on LinkedIn
Follow @AlgeriaTechNews on X for daily tech insights Follow on X

Advertisement

Frequently Asked Questions

Sources & Further Reading