The Anatomy of Highly Profitable Credential Stuffing Attacks

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
Even though credential stuffing is a popular method used by hacking groups to attack businesses since at least late 2014, there still is a lot to be uncovered about the techniques malicious actors use to run them.

Credential stuffing attacks consist of automated attempts to log into online services using user credential databases, with the success of this type of malicious campaigns being based on the unfortunately very common habit of users to use the same password for multiple accounts.

Credential collections and stuffing attacks

Recorded Future shed some light on the subject in an extensive report which shows how cybercriminals have been able to employ sets of millions of credentials stolen from high profile online platforms and companies such as Adobe, Dailymotion, VK, Bell, Tumblr, Comcast, Fling, Sony, and LinkedIn, as well as huge collections of hundreds of millions of stolen accounts sold on the dark web marketplaces [1, 2] to run credential stuffing attacks.

The most targeted organizations by credential stuffing attacks have been from the Financial, E-commerce, Social Media and Entertainment, Information Technology and Telecommunications, Restaurants and Retail, and Transportation industries.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top