UAE Cyber Security Council’s Stark Warning: Over 60% of Financial Attacks Start with Stolen Credentials, Urges Danny Jenkins of ThreatLocker
Danny Jenkins, Co-Founder and CEO of ThreatLocker, has highlighted a critical alert from the UAE Cyber Security Council that demands immediate attention from corporate leaders across the region. The Council’s alarming statistic—that over 60% of financial attacks originate from stolen login credentials—serves as a wake-up call for organizations to reassess their cybersecurity measures.
The Threat Landscape: Credential Theft
Credential theft remains a prevalent method for cybercriminals to infiltrate both government platforms and corporate networks. Once a hacker acquires valid credentials, they can access sensitive systems as easily as a thief entering through an unlocked door. This vulnerability underscores the importance of robust security frameworks that can effectively counteract such threats.
The Rise of AI in Cybercrime
Artificial intelligence (AI) has significantly enhanced the capabilities of cybercriminals, enabling them to create more convincing replicas of legitimate websites and emails. This technological advancement allows for the automation of phishing campaigns at an unprecedented scale. Cybercriminals can now generate personalized messages in flawless English or Arabic, mimicking the communication style of senior executives, and can set up fake login portals within minutes.
Moreover, advanced techniques such as voice-cloning technology, also known as voice phishing or “vishing,” enable criminals to impersonate IT personnel or executives, further complicating detection efforts. Once inside a system, AI facilitates rapid data extraction, allowing attackers to harvest sensitive information before any alarms are raised.
Human Vulnerabilities: The Weakest Link
Employees often represent the most exploited entry point in an organization’s cybersecurity defenses. Cybercriminals are adept at manipulating human psychology, employing tactics that create a sense of urgency or authority. Given that human error is inevitable, organizations must build their security frameworks with this reality in mind.
Addressing vulnerabilities where a single compromised password can grant access to critical systems is essential. Relying on the assumption that every employee will consistently safeguard their credentials is a precarious strategy for any organization.
The Limitations of Multi-Factor Authentication
While multi-factor authentication (MFA) is a widely adopted security measure, it is not a foolproof solution. Cybercriminals have developed methods to bypass MFA, necessitating a shift in organizational strategies. Many attacks begin with convincing phishing emails that lead users to counterfeit login pages mimicking trusted platforms like Microsoft 365 or Salesforce. Unbeknownst to the user, attackers can intercept credentials and MFA codes in real-time.
Even if session tokens are short-lived, they can still provide a window for data theft. Organizations must recognize the limitations of relying solely on MFA and should consider incorporating device and network verification into their authentication processes. A password and a one-time code are insufficient if the device itself is not verified through a secure network.
The Imperative for Zero Trust Cybersecurity
Looking ahead to 2026, the implementation of Zero Trust cybersecurity principles is becoming increasingly critical. This model shifts the paradigm from a default-allow to a default-deny approach, meaning that applications, scripts, and tools will not run unless explicitly authorized. This single control can significantly reduce the risk of malware and credential abuse.
Additionally, enforcing least-privilege access across all systems is vital. Employees should only have access to the data necessary for their roles, minimizing the potential damage if an account is compromised. Organizations should also restrict employee access to only the websites required for their work, blocking potentially harmful sites by default.
Modern security controls can prevent employees from inadvertently navigating to fraudulent login pages, even if they click on phishing links. While such measures may have previously been seen as intrusive, advancements in technology have made implementation much more seamless and less disruptive to workflows.
Practical Steps for Organizations
To bolster defenses, businesses should adopt tools that add device verification to user authentication processes. This means that a user should be required to provide a password, a one-time code, and ensure that the request originates from a verified device. Even if an attacker manages to steal a password and a code, they will be locked out without access to the actual device.
For financial institutions in the UAE, 2026 must be a year focused on identity discipline and proactive measures against cyber threats. By implementing Zero Trust solutions, including web access control and device-level authentication, organizations can mitigate risks and address the vulnerabilities that arise from human error.
In conclusion, the warning from the UAE Cyber Security Council serves as a crucial reminder for organizations to reassess their cybersecurity strategies. The evolving landscape of cyber threats necessitates a comprehensive approach that prioritizes security at every level.
Source: www.tahawultech.com
Keep reading for the latest cybersecurity developments, threat intelligence and breaking updates from across the Middle East.


