4 min read
Why phishing is shifting from passwords to identity infrastructure
Mara Ellis
March 17, 2026
Phishing methods used by threat actors have evolved as digital access has changed. Passwords still matter, but they are no longer the only thing standing between an attacker and valuable systems. Single sign-on, OAuth, browser sessions, tokens, and app permissions have made identity more connected, more convenient, and more attractive to abuse. Attackers now aim for that larger trust framework, such as identity infrastructure, because it gives them broader access and often lets them stay active longer. Old phishing defenses that focused mainly on password hygiene and user awareness cannot fully address that reality.
How phishing used to work
Phishing usually works by impersonating trustworthy senders and pushing the victim to an illegitimate website or prompt that looks authentic enough to have them act. The usual method this form of social engineering uses is email or chat to get people to click on fraudulent links or visit fake sites designed to steal usernames, passwords, bank account information, or other private information.
A 2019 JAMIA study of a U.S. healthcare system shows how effective that model can be. Across 20 simulated phishing campaigns, 35,580 employees received 390,908 emails, and among the 5,416 employees who received all 20 campaigns, only 17.9% avoided clicking every phishing message, while 65.3% clicked at least two, and 1.6% clicked at least 10.
Once attackers obtain the credentials, they can take over the account, use the same password on other services, or exploit the compromised account for fraud, malware delivery, or a larger attack. The old paradigm is under even more stress in today's cloud environments because OpenID Connect, OAuth, delegated access tokens, and single sign-on let one identity session reach numerous connected systems. This means that phishing does not have to stop at stealing passwords to be effective.
Why attackers care less about passwords alone
Attackers are not concerned as much about passwords now because modern access does not rely on a single secret. Investigations on enterprise authentication find that outdated password-only models are inadequate for the contemporary technological climate. Authentication systems suggest that organisations are increasingly dependent on multi-factor controls, as a solitary password fails to prevent unauthorised access. In that environment, tools like Paubox matter because they help stop phishing emails before they can push users into fake sign-ins, malicious approval flows, or credential capture attempts.
Single sign-on allows a user to log in once and then access multiple apps in the same session. Consequently, when an individual gets into one account, they can get into many more. Users may allow third-party apps access to protected resources without sharing their login information. As a Sensors study explains, “OAuth is an open-source authorization standard that is mainly used to provide access to web applications and services.” Therefore, attackers are more likely to strike at approvals, delegated access, and tokens instead of just the password field.
How phishing now targets identity infrastructure
As the journal article BAuth-ZKP—A Blockchain-Based Multi-Factor Authentication Mechanism for Securing Smart Cities, “The classical ‘password-only' approaches for ensuring security and privacy are no longer sufficient for the current technological era.” Modern phishing targets the entire identity path. The sign-in flow, the session, the token, the consent prompt, and the trust relationships that link one user to numerous services.
Attackers know that a single login may be part of a larger system that includes browser cookies, delegated rights, and session-based trust. A browser cookie can keep a session active after a user logs in, so the next service may not require a login if they are already registered.
When an attacker gains access to a legitimate session, they can exploit it to bypass authentication and gain direct access to the system. It makes previously authenticated access a more lucrative target than a simple password. One-time passwords and other extra security measures fail to repair the problem as well. Attackers are more likely to try to bypass or defeat those measures rather than simply attacking the password.
What the modern phishing chain looks like
- Modern phishing chains often start with attacker preparation. Attackers choose the delivery method, such as email, SMS, voice, QR code, or a malicious website, and shape the lure around the target’s likely behavior.
- The next step is the phishing message itself. It may be a link, attachment, fake prompt, shared file, or other communication designed to look normal enough for the victim to click, scan, download, or respond.
- In older phishing chains, attackers mainly tried to steal usernames and passwords through fake login pages. In modern chains, they may also capture one-time passcodes, intercept authentication steps, or trick users into granting access through authorization flows.
- Cloud access changes the next stage. Attackers may obtain active sessions, access tokens, or delegated permissions that let them move across multiple services without repeatedly asking for credentials.
- Once access is gained, attackers can steal data, impersonate the victim, send more phishing messages from a trusted account, or move deeper into connected systems.
How to respond
Email security is still part of the answer, but it is not the only thing that proves effective. Phishing simulations in healthcare show that repeated efforts can lower click rates over time, but people remain vulnerable enough that awareness alone is not enough to protect them. A stronger response includes multilayer email screening, authentication that is resistant to phishing, stricter app consent governance, termination of sessions and tokens during incident response, and close monitoring of identity logs for unusual sign-ins or delegated access. As a HIPAA compliant email software, Paubox can help with that first layer by stopping phishing attempts, spoofing, malicious URLs, malware, and QR code threats before they trick users into fraudulent sign-ins or hazardous approval procedures.
FAQs
What makes session hijacking different from password theft?
Password theft steals the secret used to log in. Session hijacking steals access after login has already happened.
Why are tokens valuable to attackers?
Tokens can act like proof that a user is already authenticated or approved. That can let attackers access systems without asking for the password again.
What is consent phishing in simple terms?
Consent phishing tricks a user into approving an app or service that should not have access. The user grants access themselves without realizing the risk.
Subscribe to Paubox Weekly
Every Friday we bring you the most important news from Paubox. Our aim is to make you smarter, faster.
