Apr 02, 2026 • SentinelOne
The Identity Paradox: The Hidden Risks in Your Valid Credentials
The article highlights the "Identity Paradox," where increased identity telemetry fails to prevent breaches using valid credentials. Attackers, including...
Executive Summary
The article highlights the "Identity Paradox," where increased identity telemetry fails to prevent breaches using valid credentials. Attackers, including North Korean IT workers infiltrating Western firms via fake personas, leverage legitimate access to bypass security controls. Supply chain risks are elevated through compromised developer accounts, exemplified by the "GhostAction" campaign targeting GitHub and NPM repositories. These identity-based intrusions are difficult to detect as activity mimics normal user behavior. Impact includes unauthorized access to cloud infrastructure, secrets extraction, and financial theft via malicious code injections. Mitigation requires moving beyond traditional authentication to detect intent anomalies. Organizations must secure non-human identities, monitor service accounts, and validate user intent rather than relying solely on credential verification. Security teams should prioritize detecting session hijacking and adversary-in-the-middle phishing to counter these evolving identity-focused threats effectively.
Summary
Identity attacks are rising as trust expands — learn how to detect misuse, close gaps, and defend beyond authentication.
Published Analysis
The article highlights the "Identity Paradox," where increased identity telemetry fails to prevent breaches using valid credentials. Attackers, including North Korean IT workers infiltrating Western firms via fake personas, leverage legitimate access to bypass security controls. Supply chain risks are elevated through compromised developer accounts, exemplified by the "GhostAction" campaign targeting GitHub and NPM repositories. These identity-based intrusions are difficult to detect as activity mimics normal user behavior. Impact includes unauthorized access to cloud infrastructure, secrets extraction, and financial theft via malicious code injections. Mitigation requires moving beyond traditional authentication to detect intent anomalies. Organizations must secure non-human identities, monitor service accounts, and validate user intent rather than relying solely on credential verification. Security teams should prioritize detecting session hijacking and adversary-in-the-middle phishing to counter these evolving identity-focused threats effectively. Identity attacks are rising as trust expands — learn how to detect misuse, close gaps, and defend beyond authentication. For decades, attackers have favored one intrusion method over all others: compromise the identity. Long before ransomware crews industrialized extortion and modern malware ecosystems matured, adversaries understood a simple truth. If you can access a legitimate account, you can bypass most security controls and operate inside a network with the same privileges as the user who owns it. That strategy has not changed. What has changed is the scale and complexity of the identity surface attackers can exploit. Modern enterprises no longer operate around a single directory and a handful of user accounts. Instead, organizations rely on sprawling webs of identities that span SaaS platforms, cloud infrastructure, APIs, service accounts, and increasingly autonomous AI agents. A single employee account may now provide access to dozens of interconnected services, while non-human identities quietly power automation behind the scenes. This evolution has created a fundamental security dilemma: organizations now collect more identity telemetry than ever before, yet identity-based intrusions remain some of the hardest attacks to detect. Security teams are facing what can only be described as the “Identity Paradox”. More Identity Data, Less Clarity The Identity Paradox reflects a growing imbalance in modern security operations. Enterprises have unprecedented visibility into authentication events, login attempts, and access logs, yet attackers continue to breach organizations using legitimate credentials. The reason is simple: an attacker using a valid identity does not look like an attacker. They look like an employee doing their job. https://www.sentinelone.com/wp-content/uploads/2026/04/001303ae-7117-419c-9480-85e71c2041a1.mp4 SentinelOne’s Steve Stone, Warwick Webb, and Matt Berry break down some of the key aspects of the “Identity Paradox”. Under this guise, threat actors increasingly rely on techniques that inherit trusted sessions or legitimate credentials. These include stolen authentication tokens, adversary-in-the-middle (AiTM) phishing campaigns, compromised developer accounts, and even state-sponsored insiders. In each case, the attacker bypasses security by leveraging an identity that the system already trusts. When authentication appears legitimate, traditional defenses struggle to distinguish between normal activity and malicious intent. The problem is further compounded by the wide spectrum of identity abuse methods now being observed in the wild. When the Attacker Is an “Employee” At one extreme of the identity threat landscape are traditional credential theft campaigns powered by phishing, infostealers, and session hijacking tools. At the other extreme are state-sponsored actors who continue to put significant effort into infiltrating organizations by applying for open roles directly. In recent years, investigators have documented coordinated efforts by North Korean IT workers to obtain remote employment at Western technology firms. These individuals create elaborate fake personas using stolen identities and fabricated work histories to pass background checks. In 2025 alone, SentinelLABS tracked over 1,000 job applications and roughly 360 fake personas linked to these operations. Once hired, these individuals operate as legitimate insiders with authorized access to corporate infrastructure. From a telemetry perspective, the account is valid. HR has approved the employee and login activity appears normal, yet the identity itself has been subverted. This highlights the core challenge of identity defense: the system may validate who the user is, but it cannot easily validate their intent. Supply Chains & Trusted Developers The Identity Paradox also extends deeply into the software supply chain. Developers and maintainers of open-source packages...
Linked Entities
- North Korean IT workers