Credential stuffing is a type of cyberattack where attackers use credentials obtained from other data breaches and try them out across multiple websites. Since many people reuse the same combination of usernames/email addresses and passwords across multiple sites, attackers exploit this to gain unauthorized access easily.
Credential stuffing is a common type of brute-force attack. It relies on people using the same credentials or minor variations across different services to remember their passwords easier. But once a single service is breached and the user's credentials to that service are leaked, chances are high that some of the users of the services enter the same credentials for an unrelated service.
The skill required to run a credential stuffing attack is basic automation that parses through the list of credentials and enters them into the website. With data such as banking login information sold for around $65, even acquiring the breached credentials is not a hurdle for cybercriminals. Modern automations now use AI to emulate human behavior and crack a set of accurate credentials, so it does not take long to find a service to exploit with the breached credentials. Ease of execution and low cost make credential stuffing popular and frequently used by cybercriminals.
An example of a major credential stuffing attack is the breach of 23andMe, a US based genetic testing company. About 14,000 user accounts were hacked by reusing credentials leaked in other data breaches. This exploit granted the attackers access to the data of almost seven million user profiles, including those of relatives that were linked to the exploited accounts. This attack could have also been used to log in to employees' corporate resources and exploit organizations from within. With the increasing severity and frequency of data breaches, this is a huge risk that needs to be addressed.
A credential stuffing attack is carried out in four major steps.
We have seen how credential stuffing is a legitimate and widespread threat that we need to safeguard against. Here’s how you can effectively protect your personal and organization's accounts against credential stuffing.
You can prevent your accounts from being attacked by credential stuffing by implementing these measures.
Organizations can implement some measures to secure their services and corporate accounts from being affected:
To strengthen your defense against credential stuffing and other cyberthreats, consider implementing ManageEngine ADSelfService Plus, our MFA, SSO, and self-service password reset solution. It integrates MFA for your users, devices, and applications to provide an extra layer of security and reduce the risk of unauthorized access. By implementing strong and granular password policies, mandating MFA, and acting as a secure password manager, ADSelfService Plus helps secure your organizations against cyberattacks while keeping the entire process user-friendly. Moreover, you can use Have I Been Pwned to ensure that users do not use weak passwords during enterprise password resets and changes.
Credential stuffing is a type of cyberattack where attackers use credentials obtained from data breaches and try them out across multiple websites.
Brute-force attacks input random characters as credentials, hoping at least one combination would match. These guesses are made without any data, which makes the entire attack take a long time and be susceptible to being detected.
Credential stuffing is a subset of a brute-force attack where actual credentials are used, which significantly reduces the time and effort needed for an attack. Once the same credentials are detected in two accounts, the chances are high that the other of the users' accounts also use this set of credentials, which can lead to a total takeover of the victim's online activities.
Password spraying involves attackers using a small set of commonly used passwords across many different accounts. While real passwords are used, they are often weak and predictable, making them ineffective against accounts with strong, complex passwords. Users who follow good password practices are less likely to be vulnerable.
Credential stuffing uses actual sets of usernames and passwords obtained from data breaches, typically soon after the breach occurs. Because these credentials are valid and currently in use, strong password policies alone cannot protect against this type of attack. Additionally, there is a higher probability that slight variations of the leaked credentials will also work, making credential stuffing more effective than password spraying.
Credential stuffing requires only web automations such as Selenium, cURL, and PhantomJS that can parse the text files with credentials and enter them in the login screens. Some famous tools dedicated to credential stuffing include:
Credential stuffing can be prevented by requiring strong credential practices and having organizations implement stricter restrictions on credentials, including: