• XRATOR
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Cybercrime

The Growing Threat of Residential Proxies in Credential Stuffing Attacks

Understanding the Risks and Implementing Mitigation Strategies to Protect Against Credential Stuffing and Residential Proxies.

Gert Van de VenbyGert Van de Ven
January 19, 2023
in Articles, Cyber Attacks, Cybercrime
0
The Growing Threat of Residential Proxies in Credential Stuffing Attacks

Cybercrime is a growing concern for individuals and organizations alike. One of the most prevalent forms of cybercrime is credential stuffing, where cybercriminals use large collections of previously leaked username and password combinations to try and gain unauthorized access to various online platforms. Recently, the Federal Bureau of Investigation (FBI) has issued a warning about a rising trend of cybercriminals using residential proxies to conduct large-scale credential stuffing attacks without being tracked, flagged, or blocked.

What is Credential Stuffing

Credential stuffing is a type of attack where cybercriminals use large collections of username/password combinations exposed in previous data breaches to try and gain access to other online platforms. Because people commonly use the same password at every site, cybercriminals have ample opportunity to take over accounts without cracking passwords or phishing any other information. These attacks have the potential to access numerous accounts and services across multiple industries.

Why are Residential Proxies Being Used

Residential proxies are end-user computer or home routers that accept and forward requests, making it appear like a connection is from them rather than the actual initiator (attacker). These proxies are preferable over data center-hosted proxies because they make it harder for protection mechanisms to discern between suspicious and regular consumer traffic. Using these tools, cybercriminals automate credential stuffing attacks, with bots attempting to log in across numerous sites using previously stolen login credentials. Moreover, some of these proxy tools offer the option to brute-force account passwords or include “configs” that modify the attack to accommodate particular requirements, like having a unique character, minimum password length, etc.

How can Organizations Protect Themselves

The FBI has issued several recommendations for organizations to defend against credential stuffing attacks and similar account cracking attacks. These recommendations include:

  • Enabling Multi-Factor Authentication (MFA)
  • Avoiding using passwords that were leaked in previous data breaches
  • Obliging users to reset their passwords if their current ones have been compromised
  • Using fingerprinting to detect suspicious activity
  • Limiting suspicious users through shadow banning
  • Monitoring for default user agent strings used by credential stuffing tools

Conclusion

Credential stuffing is a growing concern for individuals and organizations alike. Cybercriminals are using residential proxies to hide their actual IP address behind ones commonly associated with home users, which are unlikely to be present in blocklists. Organizations can protect themselves by implementing the recommendations provided by the FBI such as enabling Multi-Factor Authentication, avoiding using passwords that were leaked in previous data breaches, using fingerprinting to detect suspicious activity, limiting suspicious users through shadow banning, and monitoring for default user agent strings used by credential stuffing tools. It is important to stay vigilant and be proactive in protecting against cybercrime to ensure the security of personal and organizational information.

Tags: Credential stuffingPhishingResidential proxy

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • Cybercriminals regularly hack into individual and organization network. They may steal password to sell them on the darkweb.

    4 websites to check if your password is in the darkweb

    0 shares
    Share 0 Tweet 0
  • 10 Essential Tools for IoT Pentesting

    0 shares
    Share 0 Tweet 0
  • Threat Modeling : from Software Security to Cyber Risk Management

    0 shares
    Share 0 Tweet 0
  • 8 TV Shows and Movies about Personal Data Abuse

    0 shares
    Share 0 Tweet 0
  • The Code Knight: Mastering the Craft of Defensive Programming

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Uncategorized
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}