• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers using e crime tool atlantis aio for credential stuffing on

Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms

You are here: Home / General Cyber Security News / Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms
March 26, 2025

Threat actors are leveraging an e-crime tool called Atlantis AIO Multi-Checker to automate credential stuffing attacks, according to findings from Abnormal Security.

Atlantis AIO “has emerged as a powerful weapon in the cybercriminal arsenal, enabling attackers to test millions of stolen credentials in rapid succession,” the cybersecurity company said in an analysis.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Credential stuffing is a type of cyber attack in which an adversary collects stolen account credentials, typically consisting of lists of usernames or email addresses and passwords, and then uses them to gain unauthorized access to user accounts on unrelated systems through large-scale automated login requests.

Cybersecurity

Such credentials could be obtained from a data breach of a social media service or be acquired from underground forums where they are advertised for sale by other threat actors.

Credential stuffing is also different from brute-force attacks, which revolve around cracking passwords, login credentials, and encryption keys using a trial and error method.

Atlantis AIO, per Abnormal Security, offers threat actors the ability to launch credential stuffing attacks at scale via pre-configured modules for targeting a range of platforms and cloud-based services, thereby facilitating fraud, data theft, and account takeovers.

“Atlantis AIO Multi-Checker is a cybercriminal tool designed to automate credential stuffing attacks,” it said. “Capable of testing stolen credentials at scale, it can quickly attempt millions of username and password combinations across more than 140 platforms.”

E-Crime Tool Atlantis AIO

The threat actors behind the program also claim that it’s built on “a foundation of proven success” and that they have thousands of satisfied clients, while assuring customers of the security guarantees baked into the platform in order to keep their purchase private.

“Every feature, update, and interaction is crafted with meticulous attention to elevate your experience beyond expectations,” they state in the official advertisement, adding “we continually pioneer solutions that drive unprecedented results.”

Targets of Atlantis AIO include email providers like Hotmail, Yahoo, AOL, GMX, and Web.de, as well as e-commerce, streaming services, VPNs, financial institutions, and food delivery services.

Cybersecurity

Another notable aspect of the tool is its ability to conduct brute-force attacks against the aforementioned email platforms and automate account recovery processes associated with eBay and Yahoo.

“Credential stuffing tools like Atlantis AIO provide cybercriminals with a direct path to monetizing stolen credentials,” Abnormal Security said.

“Once they gain access to accounts across various platforms, attackers can exploit them in multiple ways — e.g., selling login details on dark web marketplaces, committing fraud, or using compromised accounts to distribute spam and launch phishing campaigns.”

To mitigate the account takeover risks posed by such attacks, it’s recommended to enact strict password rules and implement phishing-resistant multi-factor authentication (MFA) mechanisms.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «zero day alert: google releases chrome patch for exploit used in Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks
Next Post: How PAM Mitigates Insider Threats: Preventing Data Breaches, Privilege Misuse, and More how pam mitigates insider threats: preventing data breaches, privilege misuse,»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.