Insider Threat Intelligence ยท Access Compromise

COMPROMISED
INSIDER

A trusted employee, contractor, or partner whose credentials and access are hijacked through coercion, blackmail, financial inducement, or external account compromise - weaponising trusted access without triggering standard perimeter defences.

โš  CRITICAL THREAT
Vector: Trusted Access
Type: Insider / Hybrid
๐ŸŽญ
Compromise Type
Coercion, Blackmail, Bribery, Account Hijack
Trusted access exploited without technical bypass
๐Ÿ”‘
Why Dangerous
Bypasses All Perimeter Controls
Legitimate credentials - no malware signatures, no anomalous access patterns initially
๐Ÿ’ธ
Average Cost
$15.4M per Incident
Highest cost per breach category, avg. 85 days to contain (Ponemon 2023)
๐Ÿ“‰
Detection Rate
Only 8% Caught in Time
92% of compromised insider breaches go undetected until significant damage occurs
01
01 ยท Compromise Vectors - Click to Expand
โš–๏ธ
// Vector 01
Coercion &
Blackmail
Adversary obtains leverage over an insider through embarrassing, illegal, or damaging personal information and demands system access in exchange for silence.
๐Ÿ’ฐ
// Vector 02
Financial
Inducement
Cash payments, cryptocurrency, debt relief, or employment promises made to an insider in exchange for credentials, data, or deliberate access facilitation.
๐Ÿ’ป
// Vector 03
External Account
Compromise
Attacker obtains valid insider credentials via phishing, malware, or breach database - then uses them remotely, appearing as the legitimate employee to all systems.
Coercion & Blackmail Vector
Adversaries - often organised crime, nation-state actors, or disgruntled former employees - acquire leverage through surveillance, honeypot operations, or data obtained from previous breaches. The insider is presented with a stark choice: cooperate or face exposure of affairs, financial misconduct, illegal activity, or reputational damage. Compliance is gradual and escalating.
  • Honeytrap operations: fabricated romantic relationships to gather compromising material
  • Financial surveillance: gambling debts, fraud, or undisclosed second jobs as leverage
  • Social media monitoring: private indiscretions, political views, lifestyle contradictions
  • Escalating demands - starts with "just one screenshot," escalates to admin credentials
  • Threats extended to family members to maximise psychological pressure
// Real-World Pattern
Nation-state actors (APT10, Lazarus Group) have extensively used blackmail against defence contractors and government employees. A compromised insider with SECRET-level clearance can exfiltrate classified documents for months before detection - access appears fully authorised.
// Psychological Stages
Stage 1: Initial contact & rapport building
Stage 2: Leverage acquisition & first demand
Stage 3: Compliance & escalating requests
Stage 4: Victim isolation - too deep to report
Financial Inducement Vector
Economic pressure - debt, low wages, medical costs, or lifestyle aspirations - makes financially vulnerable employees attractive recruitment targets. Adversaries identify targets through social media wealth signalling, credit bureau data, or insider knowledge of salary structures. Payments are structured to avoid detection.
  • Cryptocurrency payments to anonymous wallets eliminate paper trails
  • Structured payments below reporting thresholds to avoid financial monitoring
  • Initial "proof of concept" payment builds trust before larger data requests
  • Job offers at inflated salaries as cover for ongoing intelligence provision
  • Competitor corporate espionage accounts for 40% of all bribery-driven cases
// Target Profile
High Risk: Employees with access + financial distress

Indicators: Lifestyle inflation, sudden debt repayment, second phone, evasive about after-hours activities

Most Targeted Roles: Finance, R&D, IT admins, sales with CRM access
// Average Payout vs. Data Value
Typical insider paid: $5Kโ€“$50K per engagement
Value of stolen IP/data: $1Mโ€“$500M+
ROI for adversary: 1,000ร—โ€“10,000ร—
External Account Compromise Vector
The insider need not be willing - or even aware. Attackers obtain valid credentials through phishing, malware, breach databases, or credential stuffing, then log in remotely using the insider's identity. To all monitoring systems, the activity appears completely legitimate - same IP range, same user account, same access patterns.
  • Spear phishing harvests VPN or SSO credentials from a targeted employee
  • Info-stealer malware silently exfiltrates session tokens and saved passwords
  • Breach database credential stuffing - employees reuse personal passwords at work
  • AiTM proxy bypasses MFA, capturing authenticated session cookies directly
  • SIM-swapping hijacks phone number to intercept MFA SMS codes
// Why It Bypasses Detection
SIEM and UEBA tools are tuned to detect anomalous behaviour. A compromised account operating within normal patterns - same hours, same data volumes, same system access - generates no alerts. The attacker inherits the trusted user's behavioural baseline.
// Credential Sources Used
๐Ÿ”ด Spear phishing - most targeted, highest success
๐ŸŸก Info-stealer logs - Redline, Raccoon, Vidar
๐ŸŸก Breach databases - RockYou2024, COMB
๐Ÿ”ต AiTM proxy - Evilginx2, Modlishka
02
02 ยท Attack Flow - Click Any Node for Detail
๐ŸŽฏ
01
Target
Selection
Identify insider
โ€บ
๐Ÿ”
02
Recon &
Profiling
Build dossier
โ€บ
โš“
03
Leverage
Acquisition
Gain control
โ€บ
๐Ÿค
04
First
Approach
Make contact
โ€บ
๐Ÿ”“
05
Credential
Handoff
Access obtained
โ€บ
๐ŸŒ
06
Network
Infiltration
Lateral movement
โ€บ
๐Ÿ“ค
07
Exfil &
Objectives
Data / sabotage
โ†ฉ
03
03 ยท Step-Through Analysis - Navigate Each Phase
// Phase 01 - Identification
Target Selection
Adversaries identify insiders whose combination of access level, personal vulnerabilities, and organisational position makes them worth targeting. High-privilege accounts with exploitable personal circumstances are the primary focus.
  • IT admins, DevOps, and security staff with superuser or root access
  • Finance personnel with wire transfer authority or payroll access
  • R&D employees holding trade secrets, source code, or proprietary algorithms
  • Privileged contractors - often receive excessive access with less monitoring
  • Recently demoted, passed-over, or disgruntled employees as soft targets
// Access vs. Vulnerability Matrix
Ideal target = high access ร— high personal vulnerability

Adversaries cross-reference LinkedIn roles against social media lifestyle signals, public records (debt, bankruptcy, divorce), and breach databases to identify employees with both elevated permissions and financial or personal pressure.
34%
of insider incidents involve employees with financial stress
58%
of targeted insiders hold privileged system access
// Phase 02 - Intelligence Collection
Recon & Profiling
Before any approach, the adversary builds a comprehensive dossier on the target. This combines open-source intelligence with darker data sources to identify vulnerabilities, relationships, routines, and psychological pressure points to exploit during the approach phase.
  • LinkedIn maps title, tenure, reporting chain, and technical responsibilities
  • Social media reveals personal relationships, financial struggles, lifestyle patterns
  • Court records and public filings expose legal issues, debt, or criminal history
  • Breach databases link work email to personal passwords and other accounts
  • Physical surveillance: home address, daily routine, regular venues mapped
// Dossier Components
// Dossier Components
target_profile: {
name: "[full name]",
role: "Senior DevOps Eng.",
access: ["AWS root", "K8s", "CI/CD"],
pressure: ["$45k debt", "divorce"],
contacts: ["[spouse]", "[child school]"],
leverage: "PENDING acquisition"
}
72h
avg. time to build full OSINT profile on target
5.6B
records in public breach databases (2024)
// Phase 03 - Leverage Acquisition
Gaining Control
The adversary acquires the specific leverage needed to compel cooperation. This may be pre-existing - obtained through the recon phase - or actively engineered via honeytrap operations, planted evidence, or deliberate compromise of the target's personal accounts and communications.
  • Honeytrap: fabricated romantic or professional relationships to obtain compromising material
  • Dark web purchase of target's breach data to access personal accounts for surveillance
  • Manufactured leverage: plant illegal content, orchestrate financial transactions
  • Surveillance: physical or digital recording of illegal or compromising behaviour
  • Third-party leverage: access to information about family members used as secondary pressure
// Leverage Hierarchy
Most Effective
โ”” Criminal / legal exposure
โ”” Explicit compromising material
โ”” Financial fraud evidence

Moderately Effective
โ”” Affairs / relationship secrets
โ”” Undisclosed employment / income

Backup Leverage
โ”” Reputational / lifestyle exposure
// Nation-State Pattern
Intelligence agencies classify this as MICE recruitment: Money, Ideology, Coercion, Ego. Coercion-based recruitment is most durable - the insider cannot easily walk away once compromised.
// Phase 04 - Initial Contact
The First Approach
Contact with the target is made through a carefully chosen channel designed to minimise the risk of reporting. The approach is calibrated to the leverage type: bribery contacts are framed as business opportunities, while coercion contacts are private and threatening. The initial ask is small to test compliance and establish a pattern of cooperation.
  • Anonymous messaging platforms (Signal, Telegram, Session) used to avoid attribution
  • In-person approach at a known venue establishes physical presence and reality of threat
  • First request is intentionally minor - verify a name, confirm a system exists
  • Payment or partial relief provided immediately to establish credibility and dependency
  • Deadline and escalation threat issued to prevent reporting or delay
// Example Initial Approach (Coercion)
// Example Initial Approach (Coercion)
"We know about [X]. Your employer
does not - yet. This stays private
if you do one small thing. Confirm
whether [system] uses Okta or AD.
No data. No access. Just confirm.
You have 48 hours."
- First contact message pattern
67%
of approached targets comply with the first request
12%
of coercion victims ever report the contact
// Phase 05 - Credential Handoff
Access Obtained
The insider provides credentials, access tokens, or physical access in response to the adversary's demands. This may be a one-time handoff or an ongoing relationship with repeated credential updates. The method of handoff is designed to maintain deniability for the adversary and maximum exposure for the insider.
  • Direct password transfer via encrypted messaging, dead drops, or in-person exchange
  • Insider creates rogue admin account or backdoor access for the adversary
  • Session token sharing: insider remains logged in, shares authenticated session cookie
  • MFA bypass: insider approves push notifications for attacker's remote login attempts
  • Physical access: insider escorts attacker into secure facility or leaves device unlocked
// Handoff Methods by Risk Level
Highest Traceability
โ”” Direct message credential transfer
โ”” New account creation (audit log)

Moderate Traceability
โ”” Session token sharing
โ”” Physical facility access

Lowest Traceability
โ”” MFA push approval (attacker handles rest)
โ”” VPN credential handoff from home network
// Most Dangerous Scenario
Insider approves MFA push notifications for the attacker's remote sessions. The attacker operates with full legitimacy - no credential sharing, no new accounts, no anomaly. The insider's own behavioral baseline masks all attacker activity.
// Phase 06 - Network Infiltration
Lateral Movement
With valid insider access, the adversary operates freely within the network perimeter - moving laterally to higher-value systems, escalating privileges, and establishing persistence. Because access is legitimate, standard intrusion detection systems generate no alerts during this phase.
  • SSO cascade: insider's email login unlocks Slack, GitHub, AWS, Salesforce, Jira
  • Network mapping using insider's legitimate access - no port scanning required
  • Privilege escalation: insider requests additional permissions without suspicion
  • OAuth persistence: register durable application tokens that survive password resets
  • Data staging: aggregate target files in accessible cloud storage for later exfiltration
// Attacker Activity (Insider Session)
// Attacker Activity (Insider Session)
[Day 01] Initial access via VPN - no alert
[Day 02] Email archive search - no alert
[Day 04] GitHub repo clone - no alert
[Day 07] AWS S3 bucket enumeration - no alert
[Day 12] OAuth app registered - no alert
[Day 21] Bulk export initiated - minor flag
[Day 85] Breach detected - avg. dwell time
85d
average dwell time for compromised insider breach
// Phase 07 - Exfiltration & Objectives
Data Theft & Sabotage
The final phase delivers the adversary's objective - which may be data exfiltration, financial fraud, infrastructure sabotage, or sustained long-term access for ongoing intelligence collection. Compromised insider attacks frequently achieve multiple objectives before detection.
  • IP theft: source code, research data, customer databases, financial models
  • Financial fraud: invoice manipulation, payroll redirection, wire transfer authorisation
  • Sabotage: deletion of critical data, corruption of production systems, logic bombs
  • Persistent access: OAuth tokens and backdoors survive offboarding of the insider
  • Competitive intelligence: M&A data, pricing strategy, sales pipeline exfiltrated for rivals
// Post-Exfil Outcomes
Immediate: Data sold to competitor or nation-state; wire transfers initiated

Medium Term: IP used to fast-follow product releases; competitive advantage destroyed

Long Term: Persistent backdoor maintained for years post-insider offboarding
$15.4M
avg. total cost per compromised insider incident (Ponemon)
3ร—
more costly than external attack to contain and remediate
Phase 1 of 7
04
04 ยท Behavioural & Technical Indicators of Compromise
๐Ÿง
Behavioural Indicators
HIGH Unexplained lifestyle changes - new car, luxury goods, debt suddenly paid off
HIGH Evasive or hostile when questioned about work; avoids manager interactions
HIGH Working unusual hours without business justification, especially remote access at 2โ€“4am
MED Frequent printing or bulk downloading without clear project need
MED Using personal devices for work communications; secondary encrypted phone
LOW Expressions of financial grievance, resentment toward management, or ideological discontent
๐Ÿ’ป
Technical Indicators
HIGH Impossible travel alerts - login from two geographies within hours of each other
HIGH New OAuth application or service account registered by user account
HIGH Bulk data export, mass email forwarding rules, or unusual cloud storage uploads
MED Access to systems or data outside normal role scope - lateral access expansion
MED Multiple failed MFA pushes followed by successful approval (attacker testing)
LOW DLP alerts for sensitive keyword searches or access to off-limits document repositories
05
05 ยท Defensive Countermeasures
๐Ÿ›๏ธ
Zero Trust Access
Never implicitly trust any user - validate every access request continuously. Implement just-in-time access and require re-authentication for sensitive operations regardless of session state.
๐Ÿ”ฌ
UEBA Behavioural Analytics
Deploy User and Entity Behaviour Analytics to build baseline profiles. Flag deviations: after-hours access, unusual data volumes, new OAuth apps, access to out-of-scope systems.
๐Ÿ“‹
Least-Privilege Enforcement
Eliminate standing privilege. Users should access only what their current role requires, with elevated permissions granted on-demand, audited, and auto-expiring to limit blast radius.
๐Ÿ›ก๏ธ
Employee Support Programs
Confidential financial counselling, mental health support, and anonymous reporting channels reduce vulnerability to coercion and provide a safe path to report approach attempts.
๐Ÿ”
DLP & Egress Monitoring
Monitor and rate-limit bulk data movement - email attachments, USB transfers, cloud uploads. Alert on sensitive document access patterns that deviate from role norms.
๐Ÿ—‚๏ธ
Offboarding Access Revocation
Immediate, automated revocation of all credentials, OAuth tokens, and API keys on offboarding. Persistent tokens are a leading cause of post-employment insider breach continuation.
FOR EDUCATIONAL & DEFENSIVE RESEARCH PURPOSES ONLY