> series: anatomy_of_a_breach —— part: 091 —— attack: credential_stuffing —— source: 542M_credentials —— victims: everyone_who_reuses_passwords<span class="cursor-blink">_</span>_
In the weeks following the mega-breach data dumps, the consequences materialised with devastating speed. TeamViewer users reported that attackers had used their compromised credentials to remotely access their computers — in some cases emptying PayPal accounts or installing ransomware. Citrix forced password resets for all GoToMyPC users. GitHub, Carbonite, Twitter, and dozens of other services reported waves of credential-stuffing attacks — automated attempts to log in using the email-password combinations from LinkedIn, Myspace, and Tumblr.
The credential-stuffing epidemic of mid-2016 was the inevitable consequence of the mega-breach data dumps combined with the persistent reality that users reuse passwords across services. A password compromised on LinkedIn in 2012 — and sold on the dark web in 2016 — could unlock a user's TeamViewer, email, banking, and corporate VPN accounts if the same password had been used. The attack required no sophistication: off-the-shelf credential-stuffing tools automated the process of testing millions of credentials against target services at machine speed.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallDefending against credential stuffing requires three controls: MFA (making stolen credentials insufficient), rate limiting and account lockout (slowing automated attacks), and anomalous login detection (identifying attack patterns in real-time). Cyber Essentials mandates MFA. Our application testing verifies rate limiting and lockout policies. SOC in a Box provides real-time anomalous login detection. And UK Cyber Defence provides incident response when credential-stuffing attacks result in account compromise.
<a href="/cyber-essentials">Cyber Essentials</a> mandates MFA. <a href="/penetration-testing/web-application">Application testing</a> verifies rate limiting. <a href="https://www.socinabox.co.uk">SOC in a Box</a> detects credential-stuffing patterns.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call