{"id":11507,"date":"2019-05-15T09:59:57","date_gmt":"2019-05-15T04:29:57","guid":{"rendered":"https:\/\/www.technologyforyou.org\/?p=11507"},"modified":"2019-05-15T09:59:57","modified_gmt":"2019-05-15T04:29:57","slug":"credential-stuffing-another-cyber-attack-on-the-rise","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/credential-stuffing-another-cyber-attack-on-the-rise\/","title":{"rendered":"Credential Stuffing: another cyber-attack on the rise!"},"content":{"rendered":"<p class=\"reader-author-info__text reader-author-info__name t-16 t-bold reader-author-info__meta-author-detail--has-hover mr2\"><strong><span style=\"font-family: arial, helvetica, sans-serif;\">By Naveen Joshi &#8211;\u00a0<span class=\"lt-line-clamp__raw-line\">Founder and CEO of Allerin<\/span><\/span><\/strong><\/p>\n<p class=\"reader-author-info__text reader-author-info__name t-16 t-bold reader-author-info__meta-author-detail--has-hover mr2\"><strong><span class=\"lt-line-clamp__raw-line\" style=\"font-family: arial, helvetica, sans-serif;\">Digital Transformation Expert. Works in Data Science and IoT<\/span><\/strong><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Beware of an emerging security threat &#8211; credential stuffing &#8211; that involves bots making high-volume login attempts with stolen user credentials to execute catastrophic account hijacking and takeovers.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\"><a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/credential-stuffing-attack-prompts-reddit-to-force-password-reset\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Credential stuffing attack forced Reddit to reset their user passwords<\/a>. The company locked users\u2019 account and implored them to reset their passwords and employ a two-way authentication security method. Just the beginning of 2019, and we see a cyber-attack already.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Hackers are hungrily waiting for c<\/span><span style=\"font-family: arial, helvetica, sans-serif;\">ustomer data. We know this sad truth, yet most of us fail to follow a good Internet practice. Often we see warnings popping up while setting up a new account on any login page, which alerts us about the strength of the set passwords. Ignoring all the warnings, most of us still use the same credentials across multiple accounts or just enter the simplest password, say\u00a0<em>123456<\/em>. These poorly-crafted login credentials become one of the ways for malicious actors to execute their illegal activities. Let\u2019s explore how:<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>What is credential stuffing?<\/strong>\u00a0<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">When a data breach occurs, customer\u2019s personal identifiable information is being compromised, which includes their login credentials also. Take the example of Linkedin\u2019s 2012 security incident. In the wake of this security breach, the company lost\u00a0<u>167 million account credentials<\/u>.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">The spilled credentials are then used by hackers to execute their malicious agenda. They simply set an algorithm or design bots to test these breached credentials on a series of online applications. Due to the majority of reused and poor passwords, there is always a probability of\u00a0<a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/credential-stuffing-attacks-take-enterprise-systems-by-storm\/d\/d-id\/1327908\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">2 percent success rate for account takeovers<\/a>.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Successful logins will enable hackers to carry out illicit activities, ranging from robbing credit card details to purchasing items of their choice to stealing medical data, and so much more. Not only customers but organizations also have to face major financial loss. According to\u00a0<a href=\"https:\/\/www.akamai.com\/us\/en\/multimedia\/documents\/white-paper\/protect-your-online-business-from-credential-stuffing-white-paper.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Akamai\u2019s report<\/a>, \u201c<em>the total cost associated with credential stuffing, including fraud-related losses, operational security, application downtime, and customer churn can range from 6 million to 54 million dollars annually<\/em>.\u201d How do businesses keep their customer login details safe? How would they know whether the login request is a legitimate one? As businesses fail to recognize the traffic coming in from a bad bot, they happen to give access to bad actors. Whom to blame? Is it organizations, who fail to distinguish a legitimate person from a software program, or is it customers who do not set strong and unique passwords? Well, actually both. But considering the organization\u2019s angle, credential stuffing attack is so stealthy that it requires sophisticated tools to spot and guard against it. Fortunately, credential stuffing attacks are not carried out manually. This is probably one of the best chances to step in the battleground for defending against this attack.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>How to mitigate credential stuffing attacks?<\/strong>\u00a0<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Over the past few years, hackers have evolved in carrying out malicious activities. Earlier, bots were programmed by simple scripts. These scripts were easily detectable by hunting down cookies. But as today\u2019s sophisticated bots imitate the web browser, it becomes difficult for a bot management application to detect and distinguish between bad bots and good bots.<\/span><\/p>\n<div class=\"slate-resizable-image-embed slate-image-embed__resize-full-width\"><span style=\"font-family: arial, helvetica, sans-serif;\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/media.licdn.com\/dms\/image\/C4E12AQFoY290p9RPPw\/article-inline_image-shrink_1000_1488\/0?e=1563408000&amp;v=beta&amp;t=AyJ0h7epRqgWWrOPQANUUtzvPUNCPj4VHTsWsTwch3I\" alt=\"No alt text provided for this image\" data-media-urn=\"\" data-li-src=\"https:\/\/media.licdn.com\/dms\/image\/C4E12AQFoY290p9RPPw\/article-inline_image-shrink_1000_1488\/0?e=1563408000&amp;v=beta&amp;t=AyJ0h7epRqgWWrOPQANUUtzvPUNCPj4VHTsWsTwch3I\" \/><\/span><\/div>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Similarly, credential stuffing attacks are difficult to detect. Organizations should, therefore, adopt advanced bot detection techniques like JavaScript challenge, device fingerprinting, and behavior-based detection systems.<\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>JavaScript challenge<\/strong>\u00a0&#8211; JavaScript codes are added to the HTML page of the browser. When the page is loaded, the JavaScript code also executes. The technique, JavaScript challenge is later used to detect if the traffic coming in is able to execute the JavaScript code. If the traffic is not able to execute the code, then it is considered as illegitimate. Such a technique solves the problem of sophisticated bots that emulates browsers.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>Browser\/Device\/machine fingerprinting<\/strong>\u00a0&#8211; Browser fingerprinting is one of the robust techniques that gather information about the browser. Every little information, right from its version to its type to active plugins to set language and font to other such characteristics is collected with the help of this method. A bot management solution will then easily monitor the browser fingerprint to detect malicious intent of the client. The solution can identify whether the client is actually a bot striving to trick an authorized browser.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>Behavior-based detection systems<\/strong>\u00a0&#8211; This is one of the most-sophisticated bad bot detection solutions. It accumulates and monitors customer inputs, behavior, and interactions, ranging from a mouse hover to keyboard strokes to site navigation to mouse clicks and so much more. This data is then fed to a bot management solution, which uses ML capabilities to identify a bad bot. For example, it is obvious that straight lines are difficult to be perfectly drawn with a mouse. Cases like this itself paints a story that the operator isn\u2019t a human but a bot.<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>By Naveen Joshi &#8211;\u00a0Founder and CEO of Allerin Digital Transformation Expert. Works in Data Science and IoT Beware of an emerging security threat &#8211; credential stuffing &#8211; that involves bots making high-volume login attempts with stolen user credentials to execute catastrophic account hijacking and takeovers. Credential stuffing attack forced Reddit to reset their user passwords. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11508,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,4],"tags":[6284,6285],"class_list":{"0":"post-11507","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"category-technology","9":"tag-how-to-mitigate-credential-stuffing-attacks","10":"tag-tips-to-prevent-credential-stuffing-attacks"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/11507","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=11507"}],"version-history":[{"count":0,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/11507\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media\/11508"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=11507"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=11507"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=11507"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}