Credential Stuffing

Post Reply
User avatar
Royal
Posts: 10566
Joined: Mon Apr 11, 2011 5:55 pm

Credential Stuffing

Post by Royal » Wed May 15, 2019 7:27 am

Cyber Security: How to Prevent Credential Stuffing Attacks

Beware of an emerging security threat: Credential stuffing. This involves bots making high-volume login attempts with stolen user credentials to execute catastrophic account hijacking and takeovers.

A credential stuffing attack forced Reddit to reset their user passwords. The company locked users’ account and implored them to reset their passwords and employ a two-way authentication security method. 2019 witnessed the rise of spectacular cyber-attacks.

Hackers are hungrily waiting for customer data. We know this sad truth, yet most of us fail to follow a good Internet practice. Often we see warnings popping up while setting up a new account on any login page, which alerts us about the strength of the set passwords. Ignoring all the warnings, most of us still use the same credentials across multiple accounts or just enter the simplest password, say 123456. These poorly-crafted login credentials become one of the ways for malicious actors to execute their illegal activities. Let’s explore how:

What is credential stuffing? When a data breach occurs, customers' personal identifiable information are compromised, this also include their login credentials. Take the example of Linkedin’s 2012 security incident. In the wake of this security breach, the company lost 167 million account credentials.

https://www.bbntimes.com/en/technology/ ... ng-attacks


Post Reply