February 22, 2022
In a credential stuffing attack, fraudsters use automated tools (i.e. bots) to break into user accounts. The bots inject stolen credentials, generally usernames and passwords, into login forms to gain access and assume control of victim accounts. To overcome failures, attackers may insert multiple variations of the credentials, adding a brute-force element to the attack.
The attackers typically collect the stolen credentials from data breaches, password dumps, phishing attacks, or via the dark web. People tend to reuse usernames and passwords across sites, so trying to login through the target site with a leaked password used on another site often works.
The perpetrators generally target a wide variety of websites and apps such as social media platforms, ecommerce sites, banking websites, email platforms, and other services. A successful attack can uncover hundreds or even thousands of valid login credentials. When that occurs, the fraudsters have a multitude of options for each working credential set. Depending on the type of site compromised, possibilities include:
Credential stuffing attacks are on the rise, with billions of stolen credentials now available to attackers. As part of a public awareness campaign, the New York Attorney General issued a bulletin on January 5, 2022 to raise public awareness about the threat. According to the bulletin, an investigation recently discovered 17 well-known companies that experienced significant credential stuffing attacks. Many of the firms were unaware that their customers' passwords had been compromised. “Right now,” the bulletin reads, “there are more than 15 billion stolen credentials being circulated across the internet.”
Here are some other recent examples of significant credential stuffing attacks:
The security community is seeing a rise of credential stuffing attacks like those described above for several reasons. First, many organizations continue to use single-factor authentication (SFA) to protect their authorized accounts. This enables malicious actors to gain access to and misuse an account if they obtain the corresponding credential set from a data breach or other source, without requiring a second form of verification like clicking an email link or getting an SMS code.
Second, many users reuse the same passwords for multiple accounts, which raises the likelihood of a credential stuffing attack succeeding across multiple web services. This sort of password reuse occurs even though users typically know of the risks. A majority (92%) of respondents to a survey covered by Help Net Security in September 2021 said that they knew that password reuse was a risk. But approximately two-thirds of survey participants admitted that they had reused their credentials anyway.
Third, malicious actors are using a variety of tools to help them to evade detection. This applies to credential stuffing as well. Information Security Buzz reported that malicious actors are specifically using tools to help them determine which passwords belong to which sites. Through these types of utilities, attackers can improve their chances of flying under the radar by limiting the number of authentication attempts against a web service.
From a fraudster’s point of view, the success of a credential stuffing attack depends on a number of factors. Avoiding detection is of course paramount. More sophisticated defensive solutions like hCaptcha Enterprise thus focus on detecting and challenging suspicious activity as quickly as possible, often on the first request.
Speed is also critical to bad actors. Depending on password length, encryption, and other security measures, it takes anywhere from a few seconds to multiple years to “crack” a credential set. Unless a fraudster can quickly complete an attack, the odds of success are simply too low, and the probability of detection is too high. An active challenge solution like a CAPTCHA can thus greatly increase the cost of an attack, making it less attractive to attack. Bad actors tend to stay away from sites with technology that slows them down, and attack sites without such tools.
So what steps can an organization take to detect and stop credential stuffing attacks at the outset? Likewise, what can companies implement beforehand that will slow down attacks that do get started?
Here are some key solutions that will help:
hCaptcha is a fraud and bot mitigation platform, specifically designed to stop automated attacks like credential stuffing, account takeovers, web scraping, and many more kinds of abuse.
hCaptcha’s advanced machine learning capabilities instantly analyze visitor behavior to accurately and seamlessly deduce whether the visitor is a bad actor or a legitimate human user. Unlike other solutions, hCaptcha has always started from a privacy-first perspective, and its data-minimizing design delivers high security without compromising user privacy, processing requests close to the user and maintaining compliance with evolving privacy laws around the world while providing minimal friction to the user.
Click here to learn more about hCaptcha’s advanced accuracy and machine learning technologies, unique compliance with GDPR and other privacy laws, enterprise scalability, and other features.