Stuffing. Suchย a timelyย word now. Thereโs stuffing that goes in the Thanksgiving turkey. Thereโs Santa stuffing the Christmas stockings. There are folksย being accused right now (by other folks) of stuffing the ballot box.ย We areย going to talk about another kind of stuffing:ย credentialย stuffing.ย Letโsย talk about how to protect againstย credentialย stuffing attacks.ย
Understand Credential Stuffingย
First, what isย credentialย stuffing? (And can you get in in a gluten-free version?)ย Iโllย start with the term โcredentialโ.ย This is security-geek-speakย for a username or password. So, your โcredentialsโ for a given service are your username and password for that service.ย Credential stuffing refers to a cyberattack where a hacker tries to access a user account by trying out combinations of usernames and passwords.ย ย
- The username and password pairs can come from a variety of sources. Sometimes they areย purchasedย off a Dark Web site, for the same service being attacked. Sometimes they areย credentials for other services that the hacker uses to break into this service. Hackers know that you might well use this username/password pair for more than one service. At other times,ย the hacker can guess the username (nowadays,ย it isย often an email address) and then use brute-force techniques to guess the password.ย
- Another aspect ofย credentialย stuffing is thatย it is often automated. Wait, are there tools that automate credential stuffing? Of course! Supply and demand. If a hacker had to manually enter credentials over and over the attack would lose its cost-effectiveness. If the hacker has a tool that can do this hundreds or thousands of times an hour,ย thatโsย a different story.ย
Ways to Protect Against Credential Stuffing Attacksย
How can you protect againstย credentialย stuffing attacks?ย Here isย some good news. Many cybersecurity stepsย we have described before will help protect againstย credentialย stuffing attacks.ย
- Use a password manager. Password managersย make complex passwords easier to accept. Password managers also remove the friction in using distinct credentials for each service.ย Complex passwords make โpassword sprayingโ attacks ineffective. Use of unique credentials for each service makesย credentialย stuffing with borrowed credentialsย useless.ย
- Implement multi-factor authentication.ย It isย best to do this with an authenticator app that generates codes orย presents an accept/deny request to the user.ย
- Subscribe to a service likeย haveibeenpwndย to be notified if an email address shows up in a breach database. Asย we haveย said before, finding a userโs credentials in aย breach databaseย does notย mean their account is compromised; it just means that itย couldย be more likely to be compromised down the road.ย
- Get familiar with the patterns of user logins. You may not be able to see the sameย IP (Internet Protocol)ย address used to connect. But you might know that they always connect with their iPhone. Or they always connect via a specific cellular carrier. Or they never connect after 8 PM local time. These kinds of user-specific data are harder for hackers to simulate.ย ย
- One final way to protect againstย credentialย stuffing attacks is to set up alerts that will let you know when multiple failed login attempts are occurring. If you see an attack in progress, you can act.ย ย For instance, you can set the userโs account to block access for someย period.ย
Donโtย Worry; Youโve Got Thisย
The prospect ofย credentialย stuffing attacks might scare you. Butย donโtย worry. You already are familiar with many of the tools to prevent aย credentialย stuffing attack. Be vigilant andย you willย be fine.ย




0 Comments