Subtlety is out when it comes to compromising user credentials. Instead, cybercriminals are looking to brute-force their way in, take what they can and get out. Consider the case of GitHub: As noted by TechCrunch, the online code repository recently announced that there have been “unauthorized attempts to access a large number of accounts” using credentials stolen from other hacked sites.

According to technology firm Akamai, these account takeover (ATO) tactics are becoming popular attack vectors: In one week — Feb. 10–17, 2016 — the company analyzed a financial services attack using more than 990,000 distinct IPs that checked over 427 million accounts. Put simply? Brute force is back.

Risky Recycling?

It’s no surprise that users recycle passwords and login credentials. Between workplace authentication, social accounts and e-commerce details, it’s hard to keep track of multiple access pairs. Attackers are aware of this tendency and use it to full effect by striking out with ATO or credential stuffing attacks.

It works like this: Using multiple IP and email addresses, cybercrooks leverage stolen password and login data to attempt brute-force logins to financial, e-commerce or other high-value sites. While some users heed the advice of IT professionals and either don’t use or regularly change their access details, others haven’t been so diligent.

The result? Cybercriminals gain access and may be able to log into other services using the same credentials again and again. While recycling makes sense for paper and plastic, passwords are off the table.

Akamai Finds Rapid Reuse

As noted by Softpedia, the attacks uncovered by Akamai targeted both a financial services and entertainment company during the ATO blitz in February. This wasn’t just dipping a toe in the water; both attacks finished stronger than they started, using 993,547 and 817,390 IP addresses on day seven compared to 248,387 and 163,478 on day one.

Akamai became aware of the credential-stuffing crush after 22,555 WAF-blacklisted IPs were used. The crooks leveraged a combination of proxy servers, compromised home routers and modem-based botnets to achieve massive throughput.

Here, speed trumps success: With credentials now widely available on both public sites and deeper into the Dark Web, there’s virtually no risk for attackers if they’re refused entry — users will get a password change notification, but cybercrooks are essentially in the clear.

The moral of the story? Credential stuffing works because accessing password/login combinations isn’t hard for motivated cybercriminals, especially if sites don’t properly hash or otherwise encrypt this data. Users make it easier by reusing passwords, giving actors everything they need to carry out high-value, low-risk attacks. While sites can do their part by limiting login attempts and looking for rapid-fire IP connections, the ultimate pushback to brute force rests with users: Too much recycling puts identity at risk.

More from

Machine Learning Applications in the Cybersecurity Space

3 min read - Machine learning is one of the hottest areas in data science. This subset of artificial intelligence allows a system to learn from data and make accurate predictions, identify anomalies or make recommendations using different techniques. Machine learning techniques extract information from vast amounts of data and transform it into valuable business knowledge. While most industries use these techniques, they are especially prominent in the finance, marketing, healthcare, retail and cybersecurity sectors. Machine learning can also address new cyber threats. There…

3 min read

HHS Releases Hospital Cyber Resiliency Landscape Analysis

4 min read - On April 17, 2023, The U.S. Department of Health and Human Services (HHS) 405(d) Program announced the release of its Hospital Cyber Resiliency Initiative Landscape Analysis. This landmark analysis reports on domestic hospitals’ current state of cybersecurity preparedness. The scope of the HHS study was limited to activities that protect access to patient care and safety and reduce the negative impact of cyber threats on clinical operations. Breaches of sensitive data were considered only if the breach had a direct…

4 min read

BlackCat (ALPHV) Ransomware Levels Up for Stealth, Speed and Exfiltration

9 min read - This blog was made possible through contributions from Kat Metrick, Kevin Henson, Agnes Ramos-Beauchamp, Thanassis Diogos, Diego Matos Martins and Joseph Spero. BlackCat ransomware, which was among the top ransomware families observed by IBM Security X-Force in 2022, according to the 2023 X-Force Threat Intelligence Index, continues to wreak havoc across organizations globally this year. BlackCat (a.k.a. ALPHV) ransomware affiliates' more recent attacks include targeting organizations in the healthcare, government, education, manufacturing and hospitality sectors. Reportedly, several of these incidents resulted…

9 min read

Now Social Engineering Attackers Have AI. Do You? 

4 min read - Everybody in tech is talking about ChatGPT, the AI-based chatbot from Open AI that writes convincing prose and usable code. The trouble is malicious cyber attackers can use generative AI tools like ChatGPT to craft convincing prose and usable code just like everybody else. How does this powerful new category of tools affect the ability of criminals to launch cyberattacks, including social engineering attacks? When Every Social Engineering Attack Uses Perfect English ChatGPT is a public tool based on a…

4 min read