June 21, 2016 By Douglas Bonderud 2 min read

Subtlety is out when it comes to compromising user credentials. Instead, cybercriminals are looking to brute-force their way in, take what they can and get out. Consider the case of GitHub: As noted by TechCrunch, the online code repository recently announced that there have been “unauthorized attempts to access a large number of GitHub.com accounts” using credentials stolen from other hacked sites.

According to technology firm Akamai, these account takeover (ATO) tactics are becoming popular attack vectors: In one week — Feb. 10–17, 2016 — the company analyzed a financial services attack using more than 990,000 distinct IPs that checked over 427 million accounts. Put simply? Brute force is back.

Risky Recycling?

It’s no surprise that users recycle passwords and login credentials. Between workplace authentication, social accounts and e-commerce details, it’s hard to keep track of multiple access pairs. Attackers are aware of this tendency and use it to full effect by striking out with ATO or credential stuffing attacks.

It works like this: Using multiple IP and email addresses, cybercrooks leverage stolen password and login data to attempt brute-force logins to financial, e-commerce or other high-value sites. While some users heed the advice of IT professionals and either don’t use or regularly change their access details, others haven’t been so diligent.

The result? Cybercriminals gain access and may be able to log into other services using the same credentials again and again. While recycling makes sense for paper and plastic, passwords are off the table.

Akamai Finds Rapid Reuse

As noted by Softpedia, the attacks uncovered by Akamai targeted both a financial services and entertainment company during the ATO blitz in February. This wasn’t just dipping a toe in the water; both attacks finished stronger than they started, using 993,547 and 817,390 IP addresses on day seven compared to 248,387 and 163,478 on day one.

Akamai became aware of the credential-stuffing crush after 22,555 WAF-blacklisted IPs were used. The crooks leveraged a combination of proxy servers, compromised home routers and modem-based botnets to achieve massive throughput.

Here, speed trumps success: With credentials now widely available on both public sites and deeper into the Dark Web, there’s virtually no risk for attackers if they’re refused entry — users will get a password change notification, but cybercrooks are essentially in the clear.

The moral of the story? Credential stuffing works because accessing password/login combinations isn’t hard for motivated cybercriminals, especially if sites don’t properly hash or otherwise encrypt this data. Users make it easier by reusing passwords, giving actors everything they need to carry out high-value, low-risk attacks. While sites can do their part by limiting login attempts and looking for rapid-fire IP connections, the ultimate pushback to brute force rests with users: Too much recycling puts identity at risk.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today