{"id":2548,"date":"2020-08-05T10:00:00","date_gmt":"2020-08-05T02:00:00","guid":{"rendered":"https:\/\/www.mdis.edu.sg\/blog\/?p=2548"},"modified":"2020-08-04T11:23:30","modified_gmt":"2020-08-04T03:23:30","slug":"credential-stuffing-and-its-potential-impact","status":"publish","type":"post","link":"https:\/\/www.mdis.edu.sg\/blog\/credential-stuffing-and-its-potential-impact\/","title":{"rendered":"Credential Stuffing and Its Potential Impact"},"content":{"rendered":"\n<h4>You are your biggest security breach.<br><\/h4>\n\n\n\n<p>As of April 2020, there are <em>4.57 billion<\/em> active internet users online, 4.2 billion unique mobile internet users, 3.81 billion active social media users and 3.76 billion active mobile social media users which brings us to a grand total of 16.34 billion users (Statista, 2020). Considering that there are <em>7.77 billion\u00a0(WorldoMeter, 2020)<\/em> people living in the world, that\u2019s <em>twice<\/em> the number of the entire human population on earth. These 16.34 billion users have different accounts and passwords that could potentially be breached by hackers. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"683\" src=\"https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/lock_circuit_board_bullet_hole_computer_security_breach_thinkstock_473158924_3x2-100732430-large-1024x683.jpg\" alt=\"\" class=\"wp-image-2550\" srcset=\"https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/lock_circuit_board_bullet_hole_computer_security_breach_thinkstock_473158924_3x2-100732430-large-1024x683.jpg 1024w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/lock_circuit_board_bullet_hole_computer_security_breach_thinkstock_473158924_3x2-100732430-large-300x200.jpg 300w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/lock_circuit_board_bullet_hole_computer_security_breach_thinkstock_473158924_3x2-100732430-large-768x512.jpg 768w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/lock_circuit_board_bullet_hole_computer_security_breach_thinkstock_473158924_3x2-100732430-large-400x267.jpg 400w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/lock_circuit_board_bullet_hole_computer_security_breach_thinkstock_473158924_3x2-100732430-large-900x600.jpg 900w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/lock_circuit_board_bullet_hole_computer_security_breach_thinkstock_473158924_3x2-100732430-large.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Now, many of you reading this\nmight disagree and say that your social media account providers or your\ninternet banking services have the latest security measures and promised to keep\nyou and your data safe. So what\u2019s there to worry about? True enough, many\ncorporations do have existing security measures set in place to keep your\naccounts safe, preventing your accounts and passwords from being attacked by malicious\nhackers. <\/p>\n\n\n\n<p>But, are your passwords different from one another? Do all\nof your accounts use a different, unique password each containing a different\npassphrase? <\/p>\n\n\n\n<p>If the answer is no, you are indirectly putting your\naccounts <em>at risk<\/em><strong>.<\/strong><\/p>\n\n\n\n<h4>One password for multiple accounts.<br><\/h4>\n\n\n\n<p>Many internet users online use weak or duplicates of their passwords for different accounts across the web. Usually due to being more convenient as well as being less of a hassle coming up with new and strong passwords over and over for every single online account. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"760\" height=\"406\" src=\"https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/Dont-Use-Same-Passwords.jpg\" alt=\"\" class=\"wp-image-2549\" srcset=\"https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/Dont-Use-Same-Passwords.jpg 760w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/Dont-Use-Same-Passwords-300x160.jpg 300w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/Dont-Use-Same-Passwords-400x214.jpg 400w\" sizes=\"(max-width: 760px) 100vw, 760px\" \/><\/figure>\n\n\n\n<p>Having duplicate passwords on multiple accounts might put you at risk in the form of password attack known as Credential Stuffing.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"389\" src=\"https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/anatomy-credential-stuffing-1024x389.jpg\" alt=\"\" class=\"wp-image-2552\" srcset=\"https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/anatomy-credential-stuffing-1024x389.jpg 1024w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/anatomy-credential-stuffing-300x114.jpg 300w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/anatomy-credential-stuffing-768x292.jpg 768w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/anatomy-credential-stuffing-1536x583.jpg 1536w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/anatomy-credential-stuffing-2048x777.jpg 2048w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/anatomy-credential-stuffing-400x152.jpg 400w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/08\/anatomy-credential-stuffing-1581x600.jpg 1581w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h4>Credential Stuffing. What is it and how does it affect me?<\/h4>\n\n\n\n<p>Credential stuffing is the\nautomated injection of breached username\/password pairs in order to\nfraudulently gain access to user accounts. Large numbers of spilled credentials\nare automatically entered into websites until they are potentially matched to\nan existing account, which the attacker can then hijack for their own purposes.\n(OWASP, 2020)<\/p>\n\n\n\n<p>For example, a particular user\nhas accounts on Gmail, Facebook, Instagram and an online shopping account each\nsharing the same ID and Password. The online shopping website might have been\nunsecured and your shopping account credentials got leaked. Here\u2019s where the\nattacker will strike.<\/p>\n\n\n\n<p><strong>Anatomy of Attack (OWASP,\n 2020)<\/strong><\/p>\n\n\n\n<ol><li>The\ncredentials got acquired by an attacker on a breached website. <\/li><li>The\nattacker will then use botnet* to test the stolen credentials against many\nwebsites.<\/li><li>Having gained a successful login (usually 0.1 \u2013\n0.2% chance of success). The attacker manages to take over another account with\nmatching credentials.<\/li><li>The attacker drains the stolen account of stored\ninformation\/ value.<\/li><li>The attacker may also use account information\nfor other nefarious purposes.<\/li><\/ol>\n\n\n\n<p>Botnet* &#8211; A&nbsp;botnet&nbsp;is a collection of\ninternet-connected devices infected by malware that allow hackers to control\nthem.<\/p>\n\n\n\n<h4>How do I prevent this?<\/h4>\n\n\n\n<p>Credential Stuffing can be prevented if proper measures are\ntaken. According to Owasp, here are the methods of prevention. (OWASP, 2020)<\/p>\n\n\n\n<ol><li>Multi-Factor Authentication<\/li><li>Secondary Passwords, PINs and Security Questions<\/li><li>Device Fingerprinting<\/li><li>Require Unpredictable Usernames<\/li><li>Block Headless Browsers<\/li><\/ol>\n\n\n\n<p>Credentials and account security should be your\nresponsibility too.<\/p>\n\n\n\n<p>If proper security measures are taken and malicious websites\nare avoided. You too can avoid being a victim of Credential Stuffing. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>You are your biggest security breach. As of April 2020, there are 4.57 billion active internet users online, 4.2 billion unique mobile internet users, 3.81 billion active social media users and 3.76 billion active mobile social media users which brings us to a grand total of 16.34 billion users (Statista, 2020). Considering that there are 7.77 billion\u00a0(WorldoMeter, 2020) people living in the world, that\u2019s twice the number of the entire human population on earth. These 16.34 billion users have different accounts and passwords that could potentially be breached by hackers. Now, many of you reading this might disagree and say [&hellip;]<\/p>\n","protected":false},"author":293,"featured_media":2551,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[24,10],"tags":[],"_links":{"self":[{"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/posts\/2548"}],"collection":[{"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/users\/293"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/comments?post=2548"}],"version-history":[{"count":2,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/posts\/2548\/revisions"}],"predecessor-version":[{"id":2556,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/posts\/2548\/revisions\/2556"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/media\/2551"}],"wp:attachment":[{"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/media?parent=2548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/categories?post=2548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/tags?post=2548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}