{"id":15138,"date":"2023-11-27T01:09:37","date_gmt":"2023-11-27T01:09:37","guid":{"rendered":"https:\/\/businessyield.com\/tech\/?p=15138"},"modified":"2023-11-27T01:09:40","modified_gmt":"2023-11-27T01:09:40","slug":"credential-stuffing","status":"publish","type":"post","link":"https:\/\/businessyield.com\/tech\/cyber-security\/credential-stuffing\/","title":{"rendered":"CREDENTIAL STUFFING: What is It & How Do You Stop It?","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"\n

Credential stuffing occurs when an attacker uses a batch of hacked user credentials to gain access to a system. This happens after all the credentials they need were obtained from a data breach at a different provider and are now being utilized to access the target system. This article provides an in-depth look into OWASP credential stuffing and how it works in cyber security, as well as effective tools and measures to prevent it from affecting your organization.<\/p>\n\n\n\n

What is credential stuffing in cyber security?<\/span><\/h2>\n\n\n\n

Credential stuffing is a type of cyberattack in cyber security in which login information from one company is stolen and then used to get into a user account at another company. The stolen information is seen in a breach or on the dark web.<\/p>\n\n\n\n

Because 64% of people use the same password for multiple (and sometimes all) accounts, credential stuffing attacks are one of the most common reasons for data breaches. Credential stuffing is so common on Auth0’s platform that almost half of all login requests we get every day are attempts to do it.<\/p>\n\n\n\n

That is to say, the more credentials become visible through leaks, cybercriminals will have more chances to use credential stuffing. Bills of stolen credentials are floating around on the dark web. You can stop credential stuffing threats, though, if you take the right cybersecurity steps.<\/p>\n\n\n\n

What is credential stuffing in cyber security?: How It Works<\/span><\/h3>\n\n\n\n

To execute a credential stuffing attack in cyber security, criminals add a list of stolen username and password pairs to a botnet, which then automatically tries those credentials on a bunch of different websites at once. Websites can get up to 180 times their normal traffic during an attack from a botnet, which can overwhelm a business’s IT system. Cybercriminals will have full access to a user’s account and personal information once they discover a website that accepts their passwords. This most commonly includes:<\/p>\n\n\n\n

#1. Selling Access to Compromised Accounts\u00a0<\/span><\/h4>\n\n\n\n

For media streaming sites, this happens a lot. Attacks where hackers sold access to user accounts for less than the price of a ticket have affected Disney+, Netflix, and Spotify.<\/p>\n\n\n\n

#2. Fraud in Electronic Commerce\u00a0<\/span><\/h4>\n\n\n\n

Hackers create fake accounts on stores’ websites to buy expensive items for themselves or to sell them again. As a result of this common (and possibly profitable for thieves) type of identity theft, Akamai’s research shows that retail is the most likely industry aimed at credential stuffing.<\/p>\n\n\n\n

#3. Corporate\/Institutional Theft and Espionage`\u00a0<\/span><\/h4>\n\n\n\n

All of the above crimes are very bad for businesses and their customers, but this third type of attack could be the worst for employers. Attackers who successfully take over an employee or administrator’s account could get private personal information like credit card numbers, social security numbers, addresses, and login credentials, which they could then sell to anyone who pays the most money.<\/p>\n\n\n\n

How to Prevent Credential Stuffing: Best Tools To Use<\/span><\/h2>\n\n\n\n

Most people know password reuse is unsafe but choose to use the same password on multiple sites anyway because they have roughly 100 passwords to remember. Password managers are an option, but adoption rates are low. <\/p>\n\n\n\n

So to prevent credential stuffing attacks in cyber security, it\u2019s up to organizations to take measures\u2014such as removing passwords altogether\u2014to ensure cybercriminals can\u2019t use stolen credentials to access their users\u2019 accounts. Based on OWASP’s Credential Stuffing Prevention Cheat Sheet, below are several tools and methods for doing so.<\/p>\n\n\n\n

How to Prevent Credential Stuffing: Step-by-step Guide<\/span><\/h3>\n\n\n\n

As scary as it may sound, many easy steps can be taken to significantly decrease the risk of credential stuffing. Some of the tools require the efforts of service providers, while others require account users to bear a bit of inconvenience.<\/p>\n\n\n\n

#1. Credential Hashing<\/span><\/h4>\n\n\n\n

Credential hashing is the first step to protecting your user’s credentials from theft. Hashing scrambles a user’s password before you store it in your database so that if it is stolen, a hacker won\u2019t be able to use it (in theory, at least). In practice, not all password hashing is uncrackable. Rick Redman, a penetration tester at KoreLogic, explains, \u201cThe strength of the hash is the insurance policy. It tells you how much time users have to change their passwords after a data breach before they come to harm. So although hashing user passwords won\u2019t prevent a credential stuffing attack, it will limit what a cybercriminal can do with those passwords once they\u2019ve stolen them.<\/p>\n\n\n\n

#2. Create Strong Passwords<\/span><\/h4>\n\n\n\n

Cybercriminals are banking on the fact that people are guilty of password reuse. A Google survey found that 65% of all people use the same username and password combination on multiple accounts. Don\u2019t be a statistic. Practice good password hygiene by creating unique passwords for each account. Use a password manager that offers a random password generator tool. A password management tool can create strong passwords for you and store them in an encrypted digital vault, protecting them from unauthorized users.<\/p>\n\n\n\n

#3. Use Multi-Factor Authentication (MFA)<\/span><\/h4>\n\n\n\n

MFA adds an extra layer of security to your login process, requiring users to provide two or more forms of identification before granting access to their accounts. This can include something the user knows, such as a password, and something they have, such as a security token or fingerprint.<\/p>\n\n\n\n

While MFA is an effective tool for preventing credential stuffing attacks, it is not the final answer. Man-in-the-middle (MITM) phishing attacks can compromise or bypass MFA and gain access to users\u2019 accounts. So, it’s important for users to only enter their credentials on websites they trust and for companies to use a strong bot management solution that protects against MITM attacks.<\/p>\n\n\n\n

#4. Use a Web Application Firewall (WAF)<\/span><\/h4>\n\n\n\n

A web application firewall can come in the form of software, an appliance, or a service. WAFs protect your applications by filtering, monitoring, and blocking any malicious traffic traveling to the web app. They can detect suspicious login attempts and abnormal traffic from bots. They do this by following policies that determine what traffic is malicious and what traffic is safe. For example, multiple login requests from multiple sites or unfamiliar IP addresses can trigger a WAF.<\/p>\n\n\n\n

#5. Use a Modern CAPTCHA<\/span><\/h4>\n\n\n\n

A CAPTCHA is a security test to distinguish humans from automated bots. Traditional CAPTCHAs may involve selecting images or entering text to prove the user’s identity. The problem is that traditional CAPTCHAs are not effective because bots can get around them. MatchKey, from Arkose Labs, is the ideal CAPTCHA. It prevents credential stuffing by using dynamic challenges that are tailored to a given attack. Websites can avoid credential stuffing attacks by asking users to complete a MatchKey challenge, which is possible even with strong passwords if they reuse them on several accounts.<\/p>\n\n\n\n

#6. Educate Your Team<\/span><\/h4>\n\n\n\n

Social engineering is among the most prominent cybersecurity dangers facing small and large enterprises. Your employees are the first line of defense when protecting your organization.  Unsure about your team\u2019s knowledge of social engineering tactics? Conduct a phishing test to see which employees take the bait. Ensure that your team knows the latest social engineering tactics and enforces policies and best practices. For companies operating with remote workers or a hybrid work model, instill good password hygiene best practices so that you have trust in your employees even when outside of the office.<\/p>\n\n\n\n

Credential Stuffing OWASP<\/span><\/h2>\n\n\n\n

The Open Web Application Security Project (OWASP) is a non-profit group created in 2001 to help website owners and security experts keep web applications safe from hackers. 32,000 people from all over the world volunteer with OWASP to do studies and security assessments. Also, the OWASP Software Assurance Maturity Model (SAMM), the OWASP Development Guide, the OWASP Testing Guide, and the OWASP Code Review Guide are some of OWASP’s most important products. We’ll talk more about the OWASP credential stuffing Top 10 below.<\/p>\n\n\n\n

Also, the following training will get you started with ModSecurity and the CRS v3.<\/p>\n\n\n\n