SaaS

Technology

Last mentioned: 2d ago

Timeline

  1. Data Exfiltration

    Sensitive data is siphoned via API calls, appearing as legitimate service-to-service traffic to bypass network security.

  2. Lateral Movement

    Using stolen tokens, attackers move from the compromised tool into the target's CRM, ERP, or email environment.

  3. Token Harvesting

    Attackers leverage existing OAuth permissions to harvest access tokens for core business systems.

  4. Initial Access

    Attacker compromises a low-security third-party SaaS tool via phishing or credential stuffing.

Stories mentioning SaaS 1