On April 12, 2026, Marcus & Millichap, Inc., a major commercial real estate brokerage firm, publicly disclosed a cybersecurity incident. The company identified unauthorized access to an internal system, which was traced back to a phishing attack that compromised an employee's credentials. The firm has activated its incident response protocol, involving external cybersecurity experts to contain and investigate the breach. The company states that the incident has had no impact on business operations and that the data accessed was limited to non-sensitive materials like forms, templates, and general contact information.
The incident at Marcus & Millichap is a classic example of a credential-harvesting phishing attack leading to unauthorized access. The attack chain likely involved an employee receiving a deceptive email, designed to look like a legitimate business communication, which prompted them to enter their login credentials on a malicious website.
T1566.002 - Phishing: Spearphishing Link.T1078 - Valid Accounts), the attacker gained access to a company system. They likely performed reconnaissance to understand what data was available.While the company has downplayed the severity, characterizing the accessed data as non-critical, any unauthorized access represents a significant security failure. The attacker could potentially use the accessed contact information for future, more targeted social engineering attacks against the company's clients or partners.
Based on the company's public statement, the direct business impact appears minimal. Operations are unaffected, and no sensitive client financial data is believed to have been compromised. However, the reputational impact could be more significant. As a brokerage firm dealing in high-value transactions, trust is a critical asset. A public data breach, even a minor one, can erode client confidence. Furthermore, the compromised contact information could be leveraged by the attackers for follow-on phishing campaigns, creating a downstream risk for Marcus & Millichap's business ecosystem. The incident also incurs costs related to the investigation, remediation, and engagement of external cybersecurity experts.
Marcus & Millichap's response appears to follow standard industry practice by engaging external experts and initiating an investigation. For other organizations looking to detect and respond to similar threats:
Detection Strategies:
D3-UGLPA: User Geolocation Logon Pattern Analysis.Response Actions:
To prevent similar phishing-based compromises, organizations should implement a defense-in-depth strategy:
M1032 - Multi-factor Authentication.M1017 - User Training. Phishing simulation exercises can test and reinforce this training.M1026 - Privileged Account Management.The single most effective control to prevent unauthorized access via stolen credentials. Even if a password is phished, the attacker cannot log in without the second factor.
Regularly train and test employees on how to identify and report phishing attempts. A well-trained user is a critical layer of defense.
Implement advanced email security gateways to detect and block phishing emails before they reach users' inboxes.
Enforce the principle of least privilege to ensure that even if an account is compromised, the attacker's access is limited to only what is necessary for that user's role.
The core lesson from the Marcus & Millichap incident is the failure of single-factor authentication. All organizations must implement Multi-Factor Authentication (MFA) across all externally facing services, including email, VPN, and cloud applications. For a real estate firm like Marcus & Millichap, this is especially critical for protecting access to CRM systems, document management platforms, and financial applications. Phish-resistant MFA, such as FIDO2 security keys, should be prioritized for privileged users and executives. For general users, a combination of authenticator apps or push notifications provides a significant security uplift over passwords alone. Enforcing MFA would have likely prevented this breach entirely, as the stolen password would have been insufficient for the attacker to gain access.
To proactively stop phishing attacks like the one that hit Marcus & Millichap, organizations need automated URL analysis at the email gateway. This involves using an email security solution that can 'detonate' or rewrite links in incoming emails. When a user clicks a link, they are first directed to a security vendor's proxy that analyzes the destination website in real-time for phishing indicators before allowing the user to proceed. This protects users who might otherwise click on a convincing phishing link. This technique moves the burden of detection from the human to the machine, effectively neutralizing the threat before the user has a chance to enter their credentials on a malicious site.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats