← All terms

Credential harvesting

The capture stage of a phishing attack — a fake login page that records whatever the victim types.

Credential harvesting is what happens after you click. The attacker hosts a clone of a login page (Microsoft 365, Okta, your bank), captures the username and password, and either forwards them or uses them immediately.

Modern harvesters proxy in real time — they pass your credentials and MFA token to the real service so you log in successfully and don't notice anything wrong, while the attacker hijacks the session.

Defenses that survive credential harvesting: hardware security keys (FIDO2/WebAuthn), passkeys, and conditional access policies tied to device posture.

Got a URL you're unsure about?

Paste it into our free scanner — verdict in seconds, 10+ threat-intel sources.

Scan a URL →