How attackers got in without anyone noticing
The attackers relied on infostealing malware, a type of malicious software that installs silently on a device and collects saved login credentials. Once active, it sends those credentials back to criminals without triggering any obvious warning. Critically, this malware does not only target office computers. It also targets personal laptops and home devices that employees use to access work systems remotely.
Here is what makes this particularly dangerous for small businesses. The stolen credentials were not always used right away. Security researchers described this as a latency problem, meaning the threat sits dormant, sometimes for years, before someone exploits it. As a result, a device infected three years ago could become a serious liability today, especially if the login credentials it captured were never changed or deactivated.
How attackers got in without anyone noticing
Multi-factor authentication, or MFA, requires users to provide two forms of verification before gaining access to a system. Typically, that means a password combined with a second factor such as a code sent to a phone, an approval push notification, or a fingerprint scan.
In every case tied to this campaign, MFA was not enforced. The attackers had the passwords. However, they did not have access to the second factor. That single missing step would have stopped the breach entirely. A stolen password without the second factor is worthless.
Why Lawton and Duncan businesses need to act now
Small businesses in Southwest Oklahoma are not invisible to cybercriminals. In fact, because many smaller organizations still rely on password-only authentication, they present an easier target than larger enterprises that have already hardened their systems.
Enforcing MFA across your business accounts, including Microsoft 365, email, and any remote access tools, closes the gap that attackers in this campaign exploited. It also protects against the latency problem. Even if a password was stolen years ago and never used, MFA renders it useless the moment someone tries to log in without the second factor.
The one step that changes everything
Some business owners push back on MFA because it adds a few extra seconds to the login process. That friction is real, but it is trivial compared to the alternative. A breach involving confidential client records, financial data, or internal communications can cost a small business far more than time.
Old passwords do not expire on their own. Without MFA enforced, every outdated credential sitting in a criminal database is still a potential entry point into your systems. One extra verification step closes that door permanently.
Wolferdawg IT Consulting helps small and mid-size businesses in Lawton, Duncan, and across Southwest Oklahoma implement and manage MFA as part of a broader cybersecurity strategy. Contact us today to get started.