Skip to main content
DFIRLab
ResearchUse CasesCompare
Intel BriefingsThreat Actors
IOC CheckFile AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab

Security research, threat intelligence, and free DFIR tools.

Tools

Phishing CheckerExposure ScannerDomain LookupFile AnalyzerPrivacy CheckAPI Playground

Use Cases

SOC Phishing TriageIR IOC EnrichmentMSSP Exposure Monitoringn8n AutomationSee all use cases →

Compare

vs VirusTotalvs Shodanvs TheHiveSee all 8 →

Resources

DFIR WikiIntel BriefingsAboutPlatformAPI Docs

Legal

Privacy PolicyRSS FeedSitemap

© 2026 DFIR Lab. All rights reserved.

Wiki/Attack Types

Credential Harvesting

The theft of usernames and passwords through fake login pages, keyloggers, or other deceptive methods designed to capture authentication credentials.

Definition

Credential harvesting is an attack technique in which threat actors collect valid authentication credentials — usernames, passwords, session tokens, or multi-factor authentication codes — from victims without their knowledge. The goal is to gain unauthorized access to accounts, systems, or networks using stolen credentials rather than exploiting technical vulnerabilities.

Why It Matters

Stolen credentials are the most common initial access vector in data breaches. Valid credentials bypass perimeter defenses entirely, allow attackers to blend in with normal user activity, and often grant lateral movement opportunities across cloud services, VPNs, and internal systems. Credential harvesting is the foundation of account takeover (ATO), BEC fraud, and ransomware deployment campaigns.

How It Works

The most prevalent method is the fake login page: a phishing email directs the victim to a cloned replica of a legitimate service (Microsoft 365, Google Workspace, a banking portal) where their credentials are captured and forwarded to the attacker. Other methods include keylogger malware installed on the endpoint, adversary-in-the-middle (AiTM) proxies that relay and intercept real authentication sessions to capture MFA tokens, and infostealers that extract saved credentials from browsers and password managers. Attackers frequently use URL redirect chains and link shorteners to obscure the final destination.

DFIR Platform

DFIR Lab Phishing Email Checker identifies credential harvesting

The DFIR Lab Phishing Email Checker identifies credential harvesting attempts by analyzing embedded URLs for known phishing patterns, following multi-stage redirect chains to their final destination, and checking landing pages against phishing databases including PhishTank and Google Safe Browsing

View Documentation

Related Concepts

Phishing AnalysisSpear PhishingQR Phishing (Quishing)Link-Display Mismatch

Try these concepts in practice

Free tier with 100 credits/month. No credit card needed.

Start Free