- Racing to Resilience
- Posts
- Smishing Explosion and 51-Second Breaches: The Invisible Threats You're Missing
Smishing Explosion and 51-Second Breaches: The Invisible Threats You're Missing
Plus: Google's $32B Wiz acquisition, Medusa ransomware threats, and why your RDP passwords are at risk.

Welcome back!
While you're busy strengthening your network perimeter and training employees to spot email phishing, attackers have shifted to two devastating tactics that bypass all your defenses: SMS-based phishing (smishing) and lightning-fast credential attacks.
The FBI recently issued an urgent warning about a massive wave of smishing scams targeting your employees' personal devices, while CrowdStrike reports attackers can now breach and move laterally across your network in just 51 seconds using stolen credentials.
Let's break down what's happening—and how to protect yourself when traditional security measures are already too late.
FBI Smishing Alert: The Toll Scam Empire Has Expanded to 10,000+ Domains
What's Happening:
The FBI has issued an urgent warning about a surge in SMS-based phishing attacks targeting smartphone users
Palo Alto Networks identified a single threat actor that has registered over 10,000 domains for smishing campaigns
The domains mimic services in at least 10 states and the Canadian province of Ontario
Scammers are expanding beyond toll payment scams to include package delivery notifications
Why This Matters Now:
Smishing bypasses your corporate email security completely. These attacks target your employees on their personal devices—outside your security perimeter but still with access to your corporate resources.
The sophistication of these operations has surged, with dedicated infrastructure of 10,000+ domains designed solely to steal credentials. Once an employee's credentials are compromised, attackers can access your network through legitimate authentication—no malware required.
What You Need to Do:
Implement a company-wide alert about the ongoing smishing campaign
Require additional verification steps for password resets and account recovery
Configure mobile device management (MDM) to block suspicious URL patterns
Implement a reporting mechanism for employees to flag suspicious text messages
Run simulated smishing tests to identify vulnerable employees
Your email security won't stop these attacks—and they're targeting the weakest link in your security chain: the personal devices that connect to your corporate resources.

51 Seconds to Breach: The Credential-Based Attacks Rewriting Security Rules
While you're patching vulnerabilities, don't overlook this: Attackers can now breach your network and move laterally in less than a minute using stolen credentials.
CrowdStrike research reveals that attackers can breach, escalate privileges, and move across your network in just 51 seconds - too fast for most security teams to detect, let alone respond.
How This Attack Works:
AI-powered vishing (voice phishing) attacks have increased by a staggering 442% in 2024
79% of successful attacks now rely on stolen credentials rather than malware
Stolen identity tokens allow attackers to move laterally without triggering alerts
One in three cloud intrusions leveraged valid credentials last year
Your Next Moves:
Revoke session tokens immediately when compromise is suspected - resetting passwords isn't enough
Enforce strict conditional access policies based on device health, location, and behavior patterns
Eliminate single points of failure in your identity management systems
Configure session token lifetimes to be as short as operationally possible
Implement real-time AI-driven anomaly detection for authentication events
Even the best detection tools can't protect your systems if attackers move faster than your security team can respond.
Headlines For the Fast Lane
Google has announced plans to acquire cybersecurity firm Wiz for $32 billion in what would be the tech giant's largest acquisition ever. The five-year-old cloud security startup is on track for $1 billion in revenue this year. The deal signals Google's aggressive push into cloud security amid intensifying competition with Microsoft and Amazon.
📌 Why It Matters: This massive acquisition shows cloud security has become the new battleground. Your current cloud security vendor may soon be owned by one of the major cloud providers—creating potential conflicts of interest in multi-cloud environments.
Federal authorities have issued a warning about the Medusa ransomware variant that has compromised data from over 300 victims in medical, education, legal, insurance, tech, and manufacturing sectors. The threat actors are recruiting access brokers, paying them between $100 and $1 million, and demanding ransoms ranging from $100,000 to $15 million.
📌 Why It Matters: The attackers' willingness to pay up to $1 million for initial access shows just how profitable ransomware has become. Your network access is worth more to criminals than ever before.
A new study from Specops reveals the most common passwords used in successful RDP attacks, with "123456" topping the list with 355,088 occurrences. Their research shows nearly 25% of compromised passwords consist solely of numbers, and almost half use only numbers or lowercase letters. Most significantly, only 1.35% of compromised passwords exceeded 12 characters.
Even passwords that seem strong can follow predictable patterns — and attackers know it. SynerComm’s Brian Judd recently explored this in his blog on Hidden Password Vulnerabilities — revealing how common habits like reusing substrings leave your systems vulnerable.
📌 Why It Matters: Despite years of security awareness training, password practices remain abysmal. Your RDP servers are likely under constant attack, and a single weak password could be your organization's downfall.
The invisible threats are now the most dangerous ones. While you're looking for malware and monitoring network traffic, attackers are walking right through your front door with valid credentials—and they're doing it faster than ever before.
In this security race, defense speed matters more than defense depth.
// IT Pit Chief