As threat actors continue to target session cookies data, browser data, customer credentials, and other sensitive data to access valuable assets across organizations, it’s imperative for organizations to have a plan for proactively preventing customer fraud and account takeover (ATO) originating from stolen credentials. But without visibility into illicit communities where these credentials are leaked and sold, organizations may not even be aware whether their customers’ credentials have been compromised.

Flashpoint CCM-C helps organizations easily monitor the exposure of compromised credentials for customer domains and email addresses. CCM-C provides visibility into the types of domains being targeted, the most most vulnerable passwords, and the most up-to-date breach data. You’ll be alerted as soon as compromised credentials are identified, allowing you to remediate risks faster, analyze and prioritize future risk, and protect your customer base.

With our recent addition of cookies data to CCM-C, organizations can easily identify malware-infected customers with compromised web session cookies. Cookies data provides additional insights into exactly how threat actors are maliciously leveraging your customer accounts to access and infiltrate your systems. By leveraging CCM-C cookies data from Flashpoint’s robust data sources, which provide further intelligence and context on threat actor’s tactics and techniques, organizations can gain deep insights into how their customers and organization are being targeted and proactively build a better defense against ATO.

Key Benefits

  • Analyze customer compromised credential exposure to predict future risks from fraud or misuse on company-owned platforms

  • Protect your customers without compromising proprietary customer credentials via secure hashing Flashpoint’s secure hashing technology, which enables safe transfer of credentials without exposing sensitive customer information

  • Access via Webhook: Receive push notifications when a customer has been compromised, enabling teams to take a proactive approach of protecting client accounts against fraudulent activity

  • Gain additional insights through cookies data into exactly how threat actors are maliciously leveraging your customer accounts to access and infiltrate your systems

  • Actively prevent misuse, which could lead to large-scale incidents and brand reputational damage

Use Case


Threat actors obtain stolen or leaked credentials and have sophisticated credential stuffing measures to access multiple accounts and websites where the stolen passwords may have been reused. Companies should take action on compromised accounts where passwords were reused to mitigate the risk of fraud loss.

  • Reset Customer Passwords; Monitor and Flag Compromised Accounts

    Organizations may use Flashpoint’s Compromised Credentials Monitoring - Customer data to inform policy decisions about whether to automate a password-reset process, monitor and flag an account, or notify a customer about their exposure. Flashpoint’s secure partial hashing capability ensures that an organization’s customer is protected; hashing ensures compromised credential information may be securely transferred between Flashpoint and a customer.

  • Require Strong Unique Passwords for New Accounts

    Organizations can require customers creating accounts to use passwords that have not been compromised previously. If a username-password combination is found within Flashpoint’s Compromised Credentials dataset, the organization can prompt the user to choose a different password.

Did this answer your question?