Credential Stuffing

7th May 2020 | Cybrary Credential Stuffing


credential stuffing cybrary term

Credential Stuffing is the autonomous injection of stolen username and password credentials in a web authentication function in the hopes of gaining unauthorized access to user accounts. Once an account login succeeds, the attacks quickly takes over the account.  At this point the hacker may perform fraudulent financial transactions, in the case of an email account they will scrape the accounts sent and deleted items folders for every last email address available to them.  They will likely target these individuals with new phishing attacks pretending to be the trusted party whose account has been hacked into.

Hackers generally gain these stolen credentials through users clicking on phishing attack links and entering their account information on fake website logins.  Alternately, they can purchase username and password databases on the dark web.  Finally, professional hackers will breach popular websites and steal the password database hoping it hasn’t been properly encrypted with salted and iteratively hashed passwords.

Source: Secret Security Wiki

Additional Reading: The Evolving Threat of Credential Stuffing

Related Terms: Phishing, Spear-Phishing, Trojan Horse

What should you do as an SMB?

Credential stuffing is another cyber attack that can be mitigated through proper cybersecurity education and awareness. Educating employees and using CyberHoot’s new phishing tests can reduce the likelihood that there is a security breach due to a user entering in credentials on a malicious site. The best way to defend against this type of attack is through proper password hygiene and training employees/staff on the dangers of phishing. Proper password hygiene can be simplified in these following steps:

  • Require employees to use a Password Manager;
  • Require employees to use a unique, complex 14+ character password or passphrase for each account you use;
  • Require Two-Factor Authentication on all Internet facing accounts;
  • Require employees change all passwords on accounts that aren’t unique;
  • Use CyberHoot’s Dark Web search tool (here) to see if any of your accounts have been exposed through online website breaches.

To learn more about Credential Stuffing, watch this short 5 minute video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more
Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Ever had your phone suddenly lose service for no reason, followed by a flood of “reset your password”...

Read more
Your WiFi Might Be Watching You… Sort Of

Your WiFi Might Be Watching You… Sort Of

As smart homes get smarter, so do their habits of watching, sensing, and reporting. Enter WiFi Motion Detection, a...

Read more