Mayur Rele Credential Stuffing Ending

Credential stuffing is one of the most common cybersecurity threats that many applications face today. Virtually, any application with a login page is usually targeted for credential stuffing. Credential stuffing is a type of cyberattack where cybercriminals gain unauthorized access into users’ accounts in an application through the reuse of compromised credentials in a previous breach. Cybersecurity criminals rely on the fact that end-users frequently use the same username and password on many platforms. Therefore, when their credential is breached on one application, it can be used to open their account on other sites.

Cybersecurity criminals often rely on bots to test username and password. Bots do not only automate the testing of username and password, but it also allows it to spread over many IP addresses which makes it difficult to differentiate between valid end-users and attacking nodes. Over the years, billions of login credentials have fallen into the hands of cybersecurity criminals as a result of data breaches which is used for a phishing email, spams, and account takeover.

Read on, as Mayur Rele, an expert in cybersecurity and cloud infrastructure with vas experience in different technology companies takes us through how to put an end to credential stuffing.

The effect of credential stuffing

Credential stuffing can be devastating as it is caused by breaching another site. It is often used to commit fraud by making an unlawful purchase from the account. The attacker can also resell the account in the black market or used it to spread wrong information, malware, fake comment, and revies on other platforms. This often destroys the image of many brands and leads to financial damages. Also, the use of bots to test credentials on many application often drive hot traffic to the site. This affects the responsiveness and availability of the application for real end-users. Therefore, it is important to control the bot as it affects both the operational performance and security of the end-users accounts.

How to prevent credential stuffing

Detection of bot

One of the best ways to detect real users from bots is the use of captcha. Captcha is a computer program used to distinguish between human and machine input on a website. It also protects the website against cyber-attack.  However, you need to be very careful as solving captcha can be automated. To overcome this, make use of Recaptcha which is available in three different versions.

Adopt strict password complexity

Many people often use simple alphabet and number which makes their account vulnerable to hackers. Therefore, sites should adopt strict password complexity rules. The password should be lengthy and combined with characters, numbers, and alphabets. If customers create a password that resembles a data breach, they should be told to create a new password. Also, guidelines should be given to customers on how to create a stronger password.

Make use of multi-factor-authentication

Multi-factor authentication is an electronic authentication that requires individuals to provide two or more credentials before their identity can be authenticated in information technology.  These credentials are often in form of biometrics, codes, password, and many more. “Multi-factor authentication is the new method used in blocking cybersecurity criminals that makes use of multiple security layers. This method makes it very difficult for cybersecurity criminals to execute credential stuffing. A good way put various obstacles to hackers who might want to penetrate your site and ensure maximum protection,”Mayur Rele says.

Adopt risk-based authentication

Risk-base authentication is the application of stringency to the authentication process. It is also used to calculate risk based on a built-in set of rules.this are often related to the user’s identity details, geo-velocity, data sensitivity, and many more. Risk-based authentication is often used when there is a high-risk scenario and the site wants their customer to use customized password security.

Originally Posted On : https://learnloftblog.com/technology/credential-stuffing/

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s