Credential-Stuffing Attacks Behind 30 Billion Login Attempts in 2018

  /     /     /  
Publicated : 23/11/2024   Category : security


Credential-Stuffing Attacks Behind 30 Billion Login Attempts in 2018


Using e-mail addresses and passwords from compromised sites, attackers most often targeted retail sites, video-streaming services, and entertainment companies, according to Akamai.



Credential stuffing — where attackers use e-mail addresses and passwords stolen from one site to attempt to access other sites — took off in 2018, with nearly 30 billion documented attempts recorded by Internet infrastructure firm Akamai, according to its new report.
The attacks are enabled by easy-to-use software and widespread botnets that can take lists of usernames and passwords and try to log into a variety of sites. On average, Akamai saw more than 115 million attempts to use stolen credentials per day, and three times during the year the attacks spiked to more than 250 million attempts per day.
The widespread attempts to log into a variety of services mean that companies need to be on watch, says Martin McKeay, a security researcher and editorial director at Akamai.
This is not something that just happens to someone else, he says. This is not something that you can ignore. It is a constant problem.
Attacks that attempt to access sites using stolen or easy-to-guess credentials have become increasingly popular. In March, for example, the FBI warned management-software firm Citrix that attackers had breached the companys network using a low-volume credential-stuffing attack — known as credential spraying — where an attacker sends a relatively low number of attempts to each targeted server. Indoing so, the attacker can avoid triggering hard limits on the number of log-in attempts.
In its
recent report
, security firm Rapid7 also found that credential stuffing attacks had taken off, ostensibly because so many username-password pairs have been stolen from compromised sites.
There are now upward of 1.5 billion credentials floating in the wild ready for use by malicious miscreants at an exposed service near your data, the company stated.
Akamai found that attackers most often targeted retail sites, video-streaming services, and entertainment companies. Because the company defined a credential-stuffing attack as a log-in attempt using an e-mail address, financial firms did not show up often in the data set, as most financial firms do not allow customer to log in with an e-mail address.
Online groups are after all sorts of credentials, McKeay says.
They are looking at getting your streaming credentials, and they are looking for your gaming credentials — there is a large market for these things, he says. If they can go and prove that what they have is a valid set of credentials, there is money to be made there.
The popularity of credential-stuffing attacks is also driven by easy-to-use software,
the Akamai report stated
. A tool named SNIPR is a popular entry-level program for targeting the simplest targets, such as gaming networks and video-streaming services. Another tool, known as STORM, allows for custom configurations that are traded and sold on the Dark Web, according to Akamai. 
Other tools are designed to
test stolen credentials validity
. Credentials proved to be valid have a much higher value in online black markets. In January, security researchers found a collection of
773 million e-mail addresses and 21 million passwords
for sale on the Dark Web. 
Intuit warned users of TurboTax in February that the reuse of usernames and passwords had allowed attackers to compromise an unknown number of accounts. 
Based on our investigation, it appears that an unauthorized party may have accessed your account by using your username and password combination that was obtained from a non-Intuit source, the company
stated in a letter sent to consumers

Akamai urged companies to continue to educate users on the reasons for using unique passwords paired with a password manager. And users should request two-factor authentication whenever a service offers the security measure.
When discussing [attack takeover] and [all-in-one] scripts, criminals often complain about the use of multifactor authentication, which is a particularly effective method of stopping most of their attacks, the company stated in its report.
Related Content
Attackers Continue to Focus on Users, Well-Worn Techniques
Citrix Breach Underscores Password Perils
Credential Compromises by the Numbers
Inside the Two Types of Account Takeover Attacks
773 Million Email Addresses, 21 Million Passwords For Sale on Hacker Forum
 
 
 
Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industrys most knowledgeable IT security experts. Check out the
Interop agenda
here.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Credential-Stuffing Attacks Behind 30 Billion Login Attempts in 2018