• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
are you willing to pay the high cost of compromised

Are You Willing to Pay the High Cost of Compromised Credentials?

You are here: Home / General Cyber Security News / Are You Willing to Pay the High Cost of Compromised Credentials?
September 25, 2023

Weak password procedures leave companies vulnerable to attacks. But are the normal password complexity requirements ample to safe them? 83% of compromised passwords would fulfill the password complexity and size needs of compliance criteria. That is mainly because negative actors now have access to billions of stolen qualifications that can be applied to compromise more accounts by reusing individuals same qualifications. To strengthen password security, corporations have to have to look past complexity prerequisites and block the use of compromised credentials.

Will need stolen credentials? There’s a current market for that

Every single time an group receives breached or a subset of customers’ credentials is stolen, you can find a large risk all individuals passwords finish up for sale on the dark web. Recall the Dropbox and LinkedIn hack that resulted in 71 million and 117 million stolen passwords? There is an underground market place that sells individuals credentials to hackers which they can then use in credential stuffing attacks.

How does credential stuffing work?

Credential stuffing is a preferred attack technique because of to the nominal energy essential for highest economic gains so a great deal so that there has been six periods as numerous qualifications getting stolen and offered in the past year by yourself. Far more and more of an chance for credential stuffing presents itself as the range of stolen qualifications carries on to increase with every single new breach. It is believed that 111 million cyberattacks take place each working day. For every a person million combos of e-mail and passwords, attackers can perhaps compromise in between 10,000 and 30,000 accounts.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Attackers use automated applications to examination the stolen qualifications on several web pages. To improve their likelihood of achievements even though decreasing the risk of detection, attackers use commonly accessible resources that assist them match passwords with specific internet websites. This can be particularly uncomplicated if the password already includes the name of the internet site or application.

Innovative bots are a well-known tool in this occasion, allowing for attackers to concurrently run a amount of login makes an attempt, all of which glimpse to originate from special IP addresses. In addition to this anonymity, bots are capable to get over very simple security measures, this kind of as banning IP addresses owing to a sequence of failed login attempts.

As soon as the login try proves fruitful, the attacker gains entry to the compromised account, granting them obtain needed to empty the account’s funds, steal delicate details, mail misleading phishing messages or spam calls, or website traffic the stolen info on the dark web. This type of attack has risen in acceptance in current many years because of to the sheer quantity of users reusing passwords throughout multiple accounts. 44 million Microsoft consumers had been found to be reusing passwords in 1 analysis in excess of a 3-thirty day period interval.

So, how can organizations protect towards a escalating danger? Just as reusing passwords across various web sites raises the vulnerability of user accounts and complicates efforts to prevent unauthorized access, detecting compromised passwords promptly and notifying influenced accounts is critical in reducing credential stuffing threats in opposition to businesses and their buyers.

Locate out if your credentials are compromised

At the time of creating, there are above 15 billion stolen qualifications on the dark web. PayPal customers infamously joined that listing previously this 12 months when the platform experienced a substantial credential-stuffing attack that impacted around 35,000 accounts. These breaches exposed delicate information and facts, such as Social Security and tax ID quantities, dates of beginning, names, and addresses. As is frequently the circumstance in such attacks, lots of of these compromised accounts reused passwords from past facts breaches.

To keep their qualifications off this at any time-increasing checklist, corporations have to do additional to safeguard their accounts. For companies working with Lively Listing, administrators can detect breached passwords, and block the use of in excess of 4 billion exceptional known compromised passwords from their network with compensated equipment this sort of as Specops Password Coverage. For a no cost choice, Specops Password Auditor can rapidly establish and handle password-related vulnerabilities inside your Energetic Directory.

Specops Password Auditor cross-references your passwords towards a database of 950 million compromised passwords. You can also recognize several other password-relevant vulnerabilities these kinds of as blank passwords, equivalent passwords, stale admin accounts, stale person accounts, and much more.

Specops Password Auditor is a excellent free of charge instrument to get a health and fitness check on your close-customers passwords, but to strengthen your organization’s password security additional, use Specops Password Coverage. You will be capable to put into practice stringent password insurance policies, including specifications for password duration, complexity, and avoidance of common character patterns and consecutive character repetitions in passwords. Specops Password Coverage and the Breached Password Security function scan your Active Directory versus a database of above 4 billion compromised passwords.

With the Steady Scan enabled, you will get quick SMS or email alerts if and when your passwords are compromised, as effectively as urgent prompts to improve them. The company is often up to date by to give ongoing protection from authentic-world password attacks.

Run a free of charge password vulnerability well being check out currently

Uncover out if your Energetic Directory users are working with compromised qualifications and consider proactive methods to stop future credential-stuffing attacks in their tracks.

Get a free of charge study-only report on your organization’s password vulnerability wellbeing, and signal up for no cost trials of the Specops Password Plan trial to avoid the high charge of compromised credentials.

Observed this posting exciting? Adhere to us on Twitter  and LinkedIn to browse more unique material we post.


Some areas of this post are sourced from:
thehackernews.com

Previous Post: «from watering hole to spyware: evilbamboo targets tibetans, uyghurs, and From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and Taiwanese
Next Post: Watch the Webinar — AI vs. AI: Harnessing AI Defenses Against AI-Powered Risks watch the webinar — ai vs. ai: harnessing ai defenses»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.