It’s no secret that passwords just aren’t very secret these days. Poor password hygiene and an overwhelming volume of digital accounts has influenced far many consumers to routinely reuse passwords across multiple accounts. As you might imagine, businesses have been hearing more and more about credential-stuffing attacks in the news.

Credential-stuffing attacks happen when a malicious actor obtains a list of stolen usernames and passwords and tests them at various other sites using a bot. The credentials themselves could come from anywhere: data breaches, phishing attacks, etc. Because so many consumers reuse the same credentials over and over again, a username and password stolen from a data breach at a major retailer could help a fraudster access that consumer’s online accounts.

To Detect Credential-Stuffing Attacks, Look for the Bots

While businesses can’t reasonably force a user to not reuse a password from another site, bot detection solutions can help detect and mitigate credential-stuffing activity. Detecting bot activity — and thereby reducing credential stuffing attacks — is helpful. Bot detection in the application layer can also help reduce denial-of-service-attacks. Bot detection that is further down, analyzing things such as behavioral biometrics, can recognize additional markers for scripted attacks and nonhuman activity.

Account Takeover: Addressing the Root Problem

Despite its utility, focusing efforts solely on bot detection to address credential-stuffing attacks is a bit like taking an aspirin for a headache when the true problem is a brain tumor. Credential stuffing is only step one; generally speaking, the ultimate goal of these attacks is account takeover. That is when a malicious actor actually gains access to an account and can begin to monetize it.

Holistic Fraud and Authentication Strategies

Business leaders should consider holistic, multilayered strategies for dealing with credential stuffing attacks and account takeovers. This means detecting bot activity and understanding the full context of the user and their activity on a site or app. By examining the user’s behavior, device, network and other behind-the-scenes factors, organizations can get a true understanding of the risk of each of their site visitors — including those that are nonhuman — and modify their authentication strategy accordingly, adapting the digital experience to match the risk.

Just as credential-stuffing attacks are indicative of the much larger issue of account takeover, this adaptive authentication is a small part of a much larger effort to actually improve the digital experience for low-risk users. This is because businesses can modify the authentication process for low-risk users as well — perhaps even embracing a passwordless strategy. Thus, organizations can move toward a world where they not only detect credential-stuffing attacks, but move the rest of us slowly away from the problem that created them in the first place.

Your Guide
to a Passwordless Customer Experience

More from Fraud Protection

New DOJ Team Focuses on Ransomware and Cryptocurrency Crime

While no security officer would rely on this alone, it’s good to know the U.S. Department of Justice is increasing efforts to fight cyber crime. According to a recent address in Munich by Deputy Attorney General Lisa Monaco, new efforts will focus on ransomware and cryptocurrency incidents. This makes sense since the X-Force Threat Intelligence Index 2022 named ransomware as the top attack type in 2021. What exactly is the DOJ doing to improve policing of cryptocurrency and other cyber…

What Are the Biggest Phishing Trends Today?

According to the 2022 X-Force Threat Intelligence Index, phishing was the most common way that cyber criminals got inside an organization. Typically, they do so to launch a much larger attack such as ransomware. The Index also found that phishing was used in 41% of the attacks that X-Force remediated in 2021. That's a 33% increase from 2021. One of the biggest reasons threat actors are increasing phishing attacks is that all it takes is one employee to make a…

Top Security Concerns When Accepting Crypto Payment

From Microsoft to AT&T to Home Depot, more companies are accepting cryptocurrency as a way to pay for products and services. This makes perfect sense as crypto coins are a viable revenue source. Perhaps the time is ripe for businesses to learn how to receive, process and convert crypto payments into fiat currency. Still, many questions remain. How can you safely enable customers to pay with Bitcoin or other digital currency? What are the security risks that come with cryptocurrency? Let’s…

NFT Security Risks: Old Scams and New Tricks

The non-fungible token (NFT) boom has also led to some serious security incidents. For example, the number of suspicious-looking domain registrations with names of NFT stores increased nearly 300% in March 2021. To participate in an NFT marketplace, you must have an active cryptocurrency wallet. This exposes NFT holders to new risks as attackers can find ways into your crypto wallet through your marketplace account. As we’ll see, threat actors have even infiltrated NFT marketplace OpenSea’s Discord server posing as…