Deretti Cyber Labs/Privacy & Identity/Identity Attack Surface

02 — Research

The Identity Attack Surface Is Personal Now

Credentials, MFA, phone numbers, data brokers, family accounts, and scams — the identity attack surface extends far beyond enterprise perimeters into family homes, personal phones, and the accounts of people who have never worked in security.

Tiago DerettiMay 202512 min read
80%
of breaches involve stolen credentials or identity attacks
~1B
devices tracked daily by one commercial location data broker (FTC 2024)
SMS
MFA does not qualify as phishing-resistant per CISA guidance

The identity attack surface used to be a technical concept — login pages, session tokens, privilege escalation paths. That separation no longer holds. The attack techniques that were once limited to well-funded adversaries are now deployed at scale against individuals: phishing kits that bypass MFA in real time, SIM swap attacks, data broker profiles that provide targeting intelligence, and AI voice clones that impersonate family members.

The Email Account as Master Key

Every identity threat analysis starts here because attackers do. Your primary email account is the recovery pathway for almost every other account you own. Whoever controls your email can reset your bank password, your social media accounts, your cloud storage, your healthcare portal — anything that sends a password reset link. The security of everything else is bounded by the security of the email account that recovers it.

Phone Numbers as Weak Links

SMS-based two-factor authentication is routinely bypassed through SIM swap attacks. The attacker convinces your carrier that they are you, transfers your phone number to a device they control, and then receives your SMS verification codes. CISA guidance is explicit: SMS MFA does not qualify as phishing-resistant. The compound vulnerability: if your email uses SMS recovery and an attacker swaps your SIM, they can recover your email, which recovers everything else.

Account Recovery as Attack Surface

Account recovery mechanisms are, by design, alternative authentication pathways — and attackers target them precisely because they often have weaker protection than the primary login.

  • Phone number recovery enables SIM swap bypass of all other authentication
  • Security questions with answers derivable from public records or social media
  • Backup email accounts with lower security than the primary account
  • Carrier account without a PIN, enabling unauthorized SIM transfers

Scams, Impersonation, and the AI Layer

AI voice clone technology has moved from research to deployed attack technique. An attacker with a short audio sample can generate synthetic speech convincing to family members in a distress scenario. The attack pattern: synthesized voice of a family member in crisis (arrested, in an accident, stranded), requesting money urgently. The scenario is designed to override normal judgment by combining social proof, urgency, and a plausible story built from publicly available information. The defense is behavioral: a family verification phrase, established in advance.

SMB and Executive Identity Security

For organizations running Microsoft 365 or Google Workspace, the personal identity security of executives and administrators is directly connected to organizational security.

  • Admin accounts without phishing-resistant MFA remain vulnerable to AiTM attacks
  • Personal accounts connected to business identity providers create cross-contamination risk
  • Break-glass accounts without proper controls — should have credentials stored offline and real-time usage alerting
  • Business email compromise targeting executives for fraudulent wire transfer approvals
  • Forgotten vendor accounts still granted access to organizational data

The Executive Attack Surface

Executives present a specific attack surface combining high-value access with above-average public information exposure. Practical hardening: dedicated email not in company directories for personal financial accounts; Google Advanced Protection Program; no personal phone number as recovery factor on organizational accounts; briefing executive assistants on social engineering techniques used to impersonate the executive themselves.

Continue Reading