Credential Stuffing is the autonomous injection of stolen username and password credentials in a web authentication function in the hopes of gaining unauthorized access to user accounts. Once an account login succeeds, the attacks quickly takes over the account. At this point the hacker may perform fraudulent financial transactions, in the case of an email account they will scrape the accounts sent and deleted items folders for every last email address available to them. They will likely target these individuals with new phishing attacks pretending to be the trusted party whose account has been hacked into.
Hackers generally gain these stolen credentials through users clicking on phishing attack links and entering their account information on fake website logins. Alternately, they can purchase username and password databases on the dark web. Finally, professional hackers will breach popular websites and steal the password database hoping it hasn’t been properly encrypted with salted and iteratively hashed passwords.
Source: Secret Security Wiki
Additional Reading: The Evolving Threat of Credential Stuffing
Related Terms: Phishing, Spear-Phishing, Trojan Horse
Credential stuffing is another cyber attack that can be mitigated through proper cybersecurity education and awareness. Educating employees and using CyberHoot’s new phishing tests can reduce the likelihood that there is a security breach due to a user entering in credentials on a malicious site. The best way to defend against this type of attack is through proper password hygiene and training employees/staff on the dangers of phishing. Proper password hygiene can be simplified in these following steps:
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Spoiler alert: If you’re still using “password123” or “iloveyou” for your login… it’s time for an...
Read moreStop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.