What is Credential Stuffing?
Credential stuffing is a type of cyberattack where stolen credentials from data breaches are used to attempt logins on other services. It exploits the common practice of password reuse across multiple accounts.
How It Works
-
Obtain Credentials
- Purchase from dark web
- Harvest from breaches
- Compile from leaks
-
Automate Attacks
- Use botnets
- Proxy rotation
- Captcha solving
-
Test Credentials
- Large-scale login attempts
- Across multiple services
-
Exploit Access
- Account takeover
- Data theft
- Fraud
Attack Characteristics
Scale
- Millions of attempts
- Automated tools
- Distributed sources
Stealth
- Valid credential format
- Mimics normal traffic
- Proxy rotation
Success Rate
- Typically 0.1-2%
- Profitable at scale
- Targets valuable accounts
Defense Strategies
Detection
- Rate limiting
- Behavioral analysis
- Failed login monitoring
- Bot detection
Prevention
- MFA requirement
- Password policies
- Credential monitoring
- CAPTCHA (limited effectiveness)
Response
- Account lockouts
- Password resets
- User notification
- Incident response
Tools and Techniques
Attack Tools
- Sentry MBA
- OpenBullet
- Custom scripts
Defense Tools
- Bot management
- WAF rules
- Threat intelligence