Marcus & Millichap Hit by Phishing Attack, Limited Data Accessed

Commercial Real Estate Firm Marcus & Millichap Discloses Phishing Attack

MEDIUM
April 12, 2026
3m read
PhishingData BreachIncident Response

Impact Scope

Affected Companies

Marcus & Millichap, Inc.

Industries Affected

FinanceLegal Services

Geographic Impact

United StatesCanada (national)

Related Entities

Full Report

Executive Summary

On April 12, 2026, Marcus & Millichap, Inc., a major commercial real estate brokerage firm, publicly disclosed a cybersecurity incident. The company identified unauthorized access to an internal system, which was traced back to a phishing attack that compromised an employee's credentials. The firm has activated its incident response protocol, involving external cybersecurity experts to contain and investigate the breach. The company states that the incident has had no impact on business operations and that the data accessed was limited to non-sensitive materials like forms, templates, and general contact information.

Threat Overview

The incident at Marcus & Millichap is a classic example of a credential-harvesting phishing attack leading to unauthorized access. The attack chain likely involved an employee receiving a deceptive email, designed to look like a legitimate business communication, which prompted them to enter their login credentials on a malicious website.

  • Initial Access: The threat actor used a phishing email to steal an employee's credentials, a technique known as T1566.002 - Phishing: Spearphishing Link.
  • Execution: The employee unknowingly provided their credentials, which the attacker then used to log in.
  • Persistence & Discovery: Using the compromised account (T1078 - Valid Accounts), the attacker gained access to a company system. They likely performed reconnaissance to understand what data was available.
  • Collection: The attacker accessed and potentially exfiltrated a limited set of data, including company forms, marketing materials, and contact information.

While the company has downplayed the severity, characterizing the accessed data as non-critical, any unauthorized access represents a significant security failure. The attacker could potentially use the accessed contact information for future, more targeted social engineering attacks against the company's clients or partners.

Impact Assessment

Based on the company's public statement, the direct business impact appears minimal. Operations are unaffected, and no sensitive client financial data is believed to have been compromised. However, the reputational impact could be more significant. As a brokerage firm dealing in high-value transactions, trust is a critical asset. A public data breach, even a minor one, can erode client confidence. Furthermore, the compromised contact information could be leveraged by the attackers for follow-on phishing campaigns, creating a downstream risk for Marcus & Millichap's business ecosystem. The incident also incurs costs related to the investigation, remediation, and engagement of external cybersecurity experts.

Detection & Response

Marcus & Millichap's response appears to follow standard industry practice by engaging external experts and initiating an investigation. For other organizations looking to detect and respond to similar threats:

Detection Strategies:

  • Email Security: Implement advanced email filtering to block phishing emails. Look for features like URL rewriting and sandboxing to detect malicious links and attachments.
  • Identity and Access Management (IAM): Monitor for suspicious login activity, such as logins from unusual geographic locations, impossible travel scenarios, or multiple failed login attempts followed by a success. This aligns with D3FEND's D3-UGLPA: User Geolocation Logon Pattern Analysis.
  • User Behavior Analytics (UBA): Use UBA tools to establish a baseline of normal user activity and alert on deviations, such as an employee accessing files or systems they do not typically use.

Response Actions:

  1. Credential Reset: Immediately force a password reset for the compromised account and any other accounts that may share the same credentials.
  2. Session Invalidation: Terminate all active sessions for the compromised user to evict the attacker.
  3. Log Analysis: Review access logs from the time of the compromise to determine the full scope of the attacker's activity, including all files and systems they accessed.

Mitigation

To prevent similar phishing-based compromises, organizations should implement a defense-in-depth strategy:

  • Multi-Factor Authentication (MFA): The single most effective mitigation against credential theft is MFA. Even if an attacker steals a password, they cannot access the account without the second factor. This is a primary recommendation, aligning with M1032 - Multi-factor Authentication.
  • User Training: Continuous security awareness training is crucial. Users should be trained to recognize phishing attempts and know how to report them. This aligns with M1017 - User Training. Phishing simulation exercises can test and reinforce this training.
  • Principle of Least Privilege: Ensure that user accounts only have access to the data and systems absolutely necessary for their job function. This limits the potential damage if an account is compromised. This is a core part of M1026 - Privileged Account Management.
  • Email Filtering and Web Security: Deploy robust email security solutions to block malicious emails and web filters to prevent users from accessing known phishing sites.

Timeline of Events

1
April 12, 2026
Marcus & Millichap issues a press release disclosing the cybersecurity incident.
2
April 12, 2026
This article was published

MITRE ATT&CK Mitigations

The single most effective control to prevent unauthorized access via stolen credentials. Even if a password is phished, the attacker cannot log in without the second factor.

Regularly train and test employees on how to identify and report phishing attempts. A well-trained user is a critical layer of defense.

Implement advanced email security gateways to detect and block phishing emails before they reach users' inboxes.

Enforce the principle of least privilege to ensure that even if an account is compromised, the attacker's access is limited to only what is necessary for that user's role.

D3FEND Defensive Countermeasures

The core lesson from the Marcus & Millichap incident is the failure of single-factor authentication. All organizations must implement Multi-Factor Authentication (MFA) across all externally facing services, including email, VPN, and cloud applications. For a real estate firm like Marcus & Millichap, this is especially critical for protecting access to CRM systems, document management platforms, and financial applications. Phish-resistant MFA, such as FIDO2 security keys, should be prioritized for privileged users and executives. For general users, a combination of authenticator apps or push notifications provides a significant security uplift over passwords alone. Enforcing MFA would have likely prevented this breach entirely, as the stolen password would have been insufficient for the attacker to gain access.

To proactively stop phishing attacks like the one that hit Marcus & Millichap, organizations need automated URL analysis at the email gateway. This involves using an email security solution that can 'detonate' or rewrite links in incoming emails. When a user clicks a link, they are first directed to a security vendor's proxy that analyzes the destination website in real-time for phishing indicators before allowing the user to proceed. This protects users who might otherwise click on a convincing phishing link. This technique moves the burden of detection from the human to the machine, effectively neutralizing the threat before the user has a chance to enter their credentials on a malicious site.

Sources & References

Marcus & Millichap Releases Information Regarding Cybersecurity Incident
Marcus & Millichap (marcusmillichap.com) April 12, 2026
Marcus & Millichap Reports Cybersecurity Incident
CPA Practice Advisor (cpapracticeadvisor.com) April 12, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

PhishingData BreachMarcus & MillichapReal EstateCredential Theft

📢 Share This Article

Help others stay informed about cybersecurity threats