Credential stuffing is a type of cyberattack where bots are used to test lists of stolen usernames and passwords across different websites and web apps. If a login is successful, the validated credential pair is used to take over accounts and to execute fraudulent activities.
Credential stuffing attacks pave the way for account takeover (ATO), which occurs when criminals gain unauthorized access to user accounts. Once an account is taken over, criminals have free rein to commit all types of fraud. This includes making fraudulent purchases with stored credit cards, transferring gift card balances and loyalty points, posting fake reviews and submitting fake warranty claims and credit applications.
Modern credential stuffing attacks are cheap and easy to launch. Attackers obtain a list of stolen credentials, most commonly by buying a list off the dark web. A 2022 investigation found over 24 billion username and password pairs up for sale, and that number has only grown since then. Other methods of stealing credentials include PII harvesting, phishing and malware.
After procuring stolen credentials, cybercriminals deploy an army of bots to attempt thousands of logins on sites across the web. The login requests are typically spread out over multiple sites simultaneously to make the attacks harder to detect. E-commerce sites, financial institutions, online gaming and email accounts are popular targets.
A Harris Poll found that 66% of people use the same password for more than one online account. Users may not change their password after being notified of a data breach, or they may only reset it on one site but not another. This allows cybercriminals to use and re-use the same credentials in attacks on multiple sites.
If the credentials work and bots gain access to an account, they can proceed as the legitimate account owner. This results in an ATO, allowing the criminal to steal the value stored in an account. The stolen credentials can then be resold on the dark web, continuing the web attack lifecycle.
Simply put, credential stuffing attacks are bad for business. A recent report from the Office of the New York State Attorney General found that companies lose an average of $6 million annually due to credential stuffing attacks. Here’s how:
A 2022 report from the Office of the New York State Attorney General, reported as many as 193 billion credential stuffing attacks in the span of one year. It can be argued that these numbers will only rise as online activity continues to increase year over year, causing more headaches for businesses and consumers. For consumers, it means being locked out of personal accounts, loss of personal data, unauthorized purchases, and stolen gift card and loyalty point balances. For businesses, it means warranty fraud, lost customers, high operational costs, and an IT burden to manage bad bots.
Detection
Awareness is the key to detecting credential stuffing attacks. The following warning signs might mean credential stuffing bots are targeting a site:
The absence of these warning signs doesn’t mean bots aren’t lurking. Bots are often deployed to multiple sites simultaneously, so they don’t call attention to themselves. This means that login rates on a particular site may not be alarmingly high and there’s no lag in site speed that would normally sound an alarm.
As bots become increasingly sophisticated and programmed to evade defenses, they can more easily fly under the radar. If companies want to keep pace, they must focus on behavioral anomalies and characteristics to stop credential stuffing attacks. This means paying attention to user interactions, mouse movements and clicks, keyboard patterns and the rate of response between pages, and then benchmarking them against a baseline.
Prevention
Preventing credential stuffing attacks requires a layered approach. The following techniques can help:
HUMAN Account Takeover Defense combats credential stuffing attacks using a two-pronged approach:
Account Takeover Defense offers Human Challenge, the first user-friendly verification tool that protects web and mobile applications by presenting a visual challenge to help easily differentiate humans from bots. Solve times for Human Challenge are four to six times faster than reCAPTCHA, and abandonment rates are three to five times lower — a winning combination.
Account Takeover Defense stops credential stuffing attacks with unparalleled accuracy. The solution safeguards online revenue, protects brand reputation and improves operational efficiency, all while preserving user experience.
What is Account Takeover? | How to Detect & Stop It
What Does CAPTCHA Mean? | How CAPTCHAs Work
What is a Brute Force Attack? | Definition, Types, & Prevention
What is Bot Detection? | How to Detect & Block Bad Bots
What is Bot Mitigation? | 4 Types of Bots & Botnets | How to Stop Bots