Protect Against Credential Stuffing Attacks

credential stuffing image

Written by Dan Callahan

I am a Senior Technical Advisor to CGNET. Formerly, I managed our Cybersecurity and Cloud Services businesses, and provided consulting to many clients over the years. I wear a lot of hats. Professionally, I'm a builder of businesses. Outside of work, I'm a hobby farmer, chef, skier, dog walker, jokester, woodworker, structuralist, husband and father.
๎‚Œ
๎€ฅ

November 5, 2020

Stuffing. Suchย a timelyย word now. Thereโ€™s stuffing that goes in the Thanksgiving turkey. Thereโ€™s Santa stuffing the Christmas stockings. There are folksย being accused right now (by other folks) of stuffing the ballot box.ย We areย going to talk about another kind of stuffing:ย credentialย stuffing.ย Letโ€™sย talk about how to protect againstย credentialย stuffing attacks.ย 

 

Understand Credential Stuffingย 

 

First, what isย credentialย stuffing? (And can you get in in a gluten-free version?)ย Iโ€™llย start with the term โ€œcredentialโ€.ย This is security-geek-speakย for a username or password. So, your โ€œcredentialsโ€ for a given service are your username and password for that service.ย Credential stuffing refers to a cyberattack where a hacker tries to access a user account by trying out combinations of usernames and passwords.ย ย 

  • The username and password pairs can come from a variety of sources. Sometimes they areย purchasedย off a Dark Web site, for the same service being attacked. Sometimes they areย credentials for other services that the hacker uses to break into this service. Hackers know that you might well use this username/password pair for more than one service. At other times,ย the hacker can guess the username (nowadays,ย it isย often an email address) and then use brute-force techniques to guess the password.ย 
  • Another aspect ofย credentialย stuffing is thatย it is often automated. Wait, are there tools that automate credential stuffing? Of course! Supply and demand. If a hacker had to manually enter credentials over and over the attack would lose its cost-effectiveness. If the hacker has a tool that can do this hundreds or thousands of times an hour,ย thatโ€™sย a different story.ย 

 

Ways to Protect Against Credential Stuffing Attacksย 

 

How can you protect againstย credentialย stuffing attacks?ย Here isย some good news. Many cybersecurity stepsย we have described before will help protect againstย credentialย stuffing attacks.ย 

  • Use a password manager. Password managersย make complex passwords easier to accept. Password managers also remove the friction in using distinct credentials for each service.ย Complex passwords make โ€œpassword sprayingโ€ attacks ineffective. Use of unique credentials for each service makesย credentialย stuffing with borrowed credentialsย useless.ย 
  • Implement multi-factor authentication.ย It isย best to do this with an authenticator app that generates codes orย presents an accept/deny request to the user.ย 
  • Subscribe to a service likeย haveibeenpwndย to be notified if an email address shows up in a breach database. Asย we haveย said before, finding a userโ€™s credentials in aย breach databaseย does notย mean their account is compromised; it just means that itย couldย be more likely to be compromised down the road.ย 
  • Get familiar with the patterns of user logins. You may not be able to see the sameย IP (Internet Protocol)ย address used to connect. But you might know that they always connect with their iPhone. Or they always connect via a specific cellular carrier. Or they never connect after 8 PM local time. These kinds of user-specific data are harder for hackers to simulate.ย ย 
  • One final way to protect againstย credentialย stuffing attacks is to set up alerts that will let you know when multiple failed login attempts are occurring. If you see an attack in progress, you can act.ย ย For instance, you can set the userโ€™s account to block access for someย period.ย 

 

Donโ€™tย Worry; Youโ€™ve Got Thisย 

 

The prospect ofย credentialย stuffing attacks might scare you. Butย donโ€™tย worry. You already are familiar with many of the tools to prevent aย credentialย stuffing attack. Be vigilant andย you willย be fine.ย 

 

You May Also Like…

You May Also Like…

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Translate ยป
Share This
Subscribe
CGNET
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.