{"id":1749,"date":"2024-04-05T06:54:42","date_gmt":"2024-04-05T06:54:42","guid":{"rendered":"https:\/\/aitesonics.com\/what-is-credential-stuffing-and-how-do-you-keep-your-accounts-safe-from-it-190044846\/"},"modified":"2024-04-05T06:54:42","modified_gmt":"2024-04-05T06:54:42","slug":"what-is-credential-stuffing-and-how-do-you-keep-your-accounts-safe-from-it-190044846","status":"publish","type":"post","link":"https:\/\/aitesonics.com\/what-is-credential-stuffing-and-how-do-you-keep-your-accounts-safe-from-it-190044846\/","title":{"rendered":"What is credential stuffing and how do you keep your accounts safe from it"},"content":{"rendered":"
Credential stuffing, or using compromised login information to take over accounts, has been around as long as we\u2019ve used passwords to secure our accounts. But, perhaps in part because it’s gotten easier for hackers to perform this type of attack, credential stuffing made headlines in recent months.<\/p>\n
Look at the 23andMe breach affecting nearly 7 million users<\/a>. While not every account was compromised via credential stuffing, it was how the hackers initially got in, and then they used a social feature called DNA Relatives to keep going. Hackers gained access to sensitive information like full names and locations, specifically targeting groups like Ashkenazi people, offering the data for sale<\/a> in bulk online.<\/p>\n Hacking conjures an image of sophisticated, high tech break-ins, but what makes credential stuffing so lucrative is that it’s surprisingly \u201cpretty unsophisticated,\u201d Rob Shavell, CEO of online personal information removal service DeleteMe, told Engadget. Hackers will use educated guesses to figure out your password, or just buy old passwords<\/a> from leaks online to see if they work for different accounts. Tactics used by hackers include using personal information found online to guess passwords or asking a generative AI program to come up with usable variations on a password to get into an account.<\/p>\n Companies frequently fail to protect your data, sticking you with the burden of preventing credential stuffing accounts to the best of your ability. In fact, credential stuffing has become so prevalent, that you\u2019ve likely already fallen victim. Nearly a quarter of all login attempts last year met the criteria for credential stuffing, according to security company Okta\u2019s 2023 State of Secure Identity Report<\/a> that surveyed more than 800 IT and security decision-makers across fields. Verizon’s 2023 analysis of data breaches<\/a> found that about half of breaches involved stolen credentials. Checking an email address on sites like Have I Been Pwned<\/a> can show you which passwords may have been compromised, meaning if you\u2019ve reused it on another account, it could be a matter of time until hackers try to use it to get in.<\/p>\n Credential stuffing works because we tend to stick to certain patterns when creating passwords, like using your mother\u2019s maiden name or a childhood address, with small variations to make them easier to remember. \u201cBecause we\u2019re lazy, and because we have 50 passwords now, it is the default to just pick one password and use it many places,\u201d chief information security officer at cloud company Akamai Steve Winterfeld said. \u201cThe problem is you then are not taking appropriate risk measures.\u201d<\/p>\n That level of risk varies widely. The one-off account you used to try out World of Warcraft years ago and doesn\u2019t have any personal or financial information attached to it probably doesn\u2019t concern you. But hackers are betting you\u2019ve reused an email, username and password for a more lucrative account, like your bank or social media, and they will use credential stuffing to get in. \u201cI have one username and password that I use for things that I\u2019m okay if they\u2019re compromised \u2026 that would not financially or brand impact me,\u201d Winterfeld said.<\/p>\n Minimizing the risks you\u2019re taking online by using strong passwords will make it a lot more manageable to start protecting yourself against credential stuffing. Changing passwords frequently, or making the switch to passkeys<\/a>, can also help. There are other ways you can protect yourself, too, as companies have made it clear that they\u2019ll do anything in their power to shirk responsibility for protecting your information.<\/p>\n First, understand that once a credential is leaked, it can be used to gain access to other accounts, Frank Teruel, CFO at bot prevention firm Arkose Labs, said. So, change passwords for any accounts where you may have repeated it, especially high-profile targets linked to financial or other sensitive institutions. This is where a password manager<\/a> comes in handy, because some will even flag if a password has been found in a breach and suggest that you change it to a stronger option.<\/p>\n Taking some time to purge accounts you no longer use will greatly reduce the number of password leaks to worry about, too, Teruel said. In the meantime, make it a habit not to reuse passwords or small variations on them, and to change passwords frequently to limit risk.<\/p>\n","protected":false},"excerpt":{"rendered":" Credential stuffing, or using compromised login information to take over accounts, has been around as long as we\u2019ve used passwords to secure our accounts. But, perhaps in part because it’s gotten easier for hackers to perform this type of attack, credential stuffing made headlines in recent months. Look at the 23andMe breach affecting nearly 7 […]<\/p>\n","protected":false},"author":6,"featured_media":1749,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2151,48,95,1350,557],"tags":[2152,59,101,1351,560],"yoast_head":"\n