It is no secret that the retail industry has suffered many devastating blows due to sophisticated cybersecurity attacks. Recently, retailers have been facing a new threat – “credential stuffing” attacks – in which hackers use stolen email addresses, user names, and passwords to attempt to break into corporations. So far in 2019, several large companies have suffered these attacks (some, multiple attacks).
Most recently, a giant Japanese retailer fell prey to a major attack where “more than 460,000 online customer accounts were fraudulently accessed between April 23 and May 10, 2019. Personal information that may have been exposed in the attack includes first and last names, full residential and shipping addresses, landline and mobile phone numbers, email address, gender, date of birth, purchase history, and partial credit card information including cardholder, expiration date, and part of credit card number.” See “Security breach hits apparel giant,” May 14, 2019.
Unfortunately, many users unwittingly facilitate these attacks by repurposing their easily cracked passwords for multiple accounts.
What Are Credential Stuffing Attacks?
Hundreds of millions of email addresses and passwords sit on the dark web. Some are purchased and quickly used, while some are held and accumulated for further criminal use at a later date. In a credential stuffing attack, attackers use previously stolen addresses and passwords (called “credentials”), coupled with advanced, automated tools to attempt millions of log-ins to a customer- or consumer-facing website. Even if most attempts are thwarted, with millions of attempts, some are bound to succeed, allowing hackers to monetize their investments. According to an April 25 article (referencing a February 2019 report),
‘with an investment of as little as $550, criminals could expect to earn at least 20 times the profit on the sale of compromised login credentials.’ [] For the $550, the crooks can get a $150 checking software, a leaked/stolen credentials database of roughly 100K user records, and enough proxies to run their credential attacks for $250/week….[The report notes] that ‘for every one million random combinations of emails and passwords, attackers can potentially compromise between 10,000 and 30,000 accounts. Moreover, the same database could then be reused over and over again to hack dozens of different websites, yielding even higher profits.’
See “The Anatomy of Highly Profitable Credential Stuffing Attacks.”
The relatively small investment necessary to commence one of these infiltrations is demonstrated by the large numbers of attempted credential stuffing attacks. Indeed, the report “showed that approximately 28 billion credential stuffing attempts were detected between May and December 2018, retail websites being the main targets of credential abuse with 10 billion attempts.” (see “Credential Abuse per Day” chart in above-linked article).
What Can You Do About Credential Stuffing Attacks?
Given that databases are being left open to theft in the wild Internet ecosystem, these attacks will likely continue at a rapid pace, especially for retailers with customer-facing websites available for log in. To minimize the likelihood of a credential stuffing attack and the resultant damage, your company may wish to consider the following basic potential safeguards:
|
With millions of customers and accounts, retailers are a regular target for credential stuffing attacks. While the defensive measures retailers need to take to secure their networks seem endless, the safeguards to protect against a successful credential stuffing attack noted above are relatively easy to implement, and much easier than handling a data breach involving millions of customers.