




Since the beginning of 2019 there have already been a number of successful campaigns which managed to infiltrate the computing systems of TurboTax, Dunkin' Donuts, Basecamp, and Dailymotion.Īdditionally, an Akamai report from February showed that approximately 28 billion credential stuffing attempts were detected between May and December 2018, retail websites being the main targets of credential abuse with 10 billion attempts.Ĭredential abuse per day (Image: Akamai) Credential stuffing toolsetĪs further explained by Recorded Future, apart from large stolen or leaked credential collections, threat actors also have to get their hands on dedicated account-checking tools and a pool of proxies to choose from and use during the attacks to avoid having their IP addresses blacklisted. The most targeted organizations by credential stuffing attacks have been from the Financial, E-commerce, Social Media and Entertainment, Information Technology and Telecommunications, Restaurants and Retail, and Transportation industries. Recorded Future shed some light on the subject in an extensive report which shows how cybercriminals have been able to employ sets of millions of credentials stolen from high profile online platforms and companies such as Adobe, Dailymotion, VK, Bell, Tumblr, Comcast, Fling, Sony, and LinkedIn, as well as huge collections of hundreds of millions of stolen accounts sold on the dark web marketplaces to run credential stuffing attacks. Credential collections and stuffing attacks Even though credential stuffing is a popular method used by hacking groups to attack businesses since at least late 2014, there still is a lot to be uncovered about the techniques malicious actors use to run them.Ĭredential stuffing attacks consist of automated attempts to log into online services using user credential databases, with the success of this type of malicious campaigns being based on the unfortunately very common habit of users to use the same password for multiple accounts.
