June 21, 2016 By Douglas Bonderud 2 min read

Subtlety is out when it comes to compromising user credentials. Instead, cybercriminals are looking to brute-force their way in, take what they can and get out. Consider the case of GitHub: As noted by TechCrunch, the online code repository recently announced that there have been “unauthorized attempts to access a large number of GitHub.com accounts” using credentials stolen from other hacked sites.

According to technology firm Akamai, these account takeover (ATO) tactics are becoming popular attack vectors: In one week — Feb. 10–17, 2016 — the company analyzed a financial services attack using more than 990,000 distinct IPs that checked over 427 million accounts. Put simply? Brute force is back.

Risky Recycling?

It’s no surprise that users recycle passwords and login credentials. Between workplace authentication, social accounts and e-commerce details, it’s hard to keep track of multiple access pairs. Attackers are aware of this tendency and use it to full effect by striking out with ATO or credential stuffing attacks.

It works like this: Using multiple IP and email addresses, cybercrooks leverage stolen password and login data to attempt brute-force logins to financial, e-commerce or other high-value sites. While some users heed the advice of IT professionals and either don’t use or regularly change their access details, others haven’t been so diligent.

The result? Cybercriminals gain access and may be able to log into other services using the same credentials again and again. While recycling makes sense for paper and plastic, passwords are off the table.

Akamai Finds Rapid Reuse

As noted by Softpedia, the attacks uncovered by Akamai targeted both a financial services and entertainment company during the ATO blitz in February. This wasn’t just dipping a toe in the water; both attacks finished stronger than they started, using 993,547 and 817,390 IP addresses on day seven compared to 248,387 and 163,478 on day one.

Akamai became aware of the credential-stuffing crush after 22,555 WAF-blacklisted IPs were used. The crooks leveraged a combination of proxy servers, compromised home routers and modem-based botnets to achieve massive throughput.

Here, speed trumps success: With credentials now widely available on both public sites and deeper into the Dark Web, there’s virtually no risk for attackers if they’re refused entry — users will get a password change notification, but cybercrooks are essentially in the clear.

The moral of the story? Credential stuffing works because accessing password/login combinations isn’t hard for motivated cybercriminals, especially if sites don’t properly hash or otherwise encrypt this data. Users make it easier by reusing passwords, giving actors everything they need to carry out high-value, low-risk attacks. While sites can do their part by limiting login attempts and looking for rapid-fire IP connections, the ultimate pushback to brute force rests with users: Too much recycling puts identity at risk.

More from

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today