Elon Musk's interference in national debates angers Europe's leaders    Israel to conceal soldiers' identities after Brazilian probe into war crimes    Saudi Crown prince and Zelenskyy discuss Ukrainian-Russian crisis in phone call    Saudi Arabia rejects Israeli claims over map published by Israeli official accounts    Islamic Arts Biennale 2025 to witness first-ever display of full kiswah of Kaaba outside Makkah city    GASTAT: Local vegetable production accounts for 80.6% of total supply    King Salman and Crown Prince offer condolences to Chinese president over earthquake victims    Saudi Arabia tops in venture capital investment, with SR2.8 billion, in MENA in 2024    Energy minister: New law to build a legislative framework for Saudi energy sector    Saudi Arabia launches "Our Winter is Rural" initiative to promote rural tourism and sustainable development    KSrelief distributes relief aid in Syrian city    Iqama of dependents of expatriates and house workers can extend from outside Saudi Arabia    Oman aims for metro project by 2032, minister says    Rajković shines as Al-Ittihad edge Al-Hilal in dramatic King's Cup quarter-final    Al-Qadsiah secures spot in King's Cup semi-finals with dominant win over Al-Taawoun    Barcelona and Athletic Bilbao arrive in Jeddah ahead of Spanish Super Cup semi-final    Saudi Arabia announces dates and venues for AFC Asian Cup 2027    Golden Globes 2025: France's 'Emilia Pérez' wins big, as 'The Brutalist' nabs major awards    Alabama nursing student wins Miss America 2025    Demi Moore continues comeback with Golden Globe win    Order vs. Morality: Lessons from New York's 1977 Blackout    India puts blockbuster Pakistani film on hold    The Vikings and the Islamic world    Filipino pilgrim's incredible evolution from an enemy of Islam to its staunch advocate    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Password, username reuse major threat to enterprise security
Published in The Saudi Gazette on 04 - 06 - 2017

Cybercriminals are increasingly turning to credential stuffing tools to automate attempts at account takeover, Digital Shadows, the industry leader in digital risk management, revealed in its report into some of the main techniques cybercriminals are using to target organizations using stolen credentials which have been reused across a variety of sites and online forums.
"This is a type of brute force attack whereby large sets of credentials are automatically inserted into login pages until a match with an existing account is found. Based on configurations, the most common targets for these attacks are the gaming, technology, broadcasting and retail sectors," Digital Shadows said.
The report "Protect Your Customer and Employee Accounts: 7 Ways To Mitigate The Growing Risks Of Account Takeovers" also outlines what measures organizations can implement to protect against such attacks, said last year Digital Shadows found that 97% of businesses in the ‘Forbes 1000' had their valuable credentials exposed, usually by employees using the same details across multiple sites and platforms. Now criminals are recognizing that employees often have poor username and password discipline to use these in mass automated credential stuffing attacks aiming to gain access to corporate networks.
"Many organizations are suffering breach fatigue due to the huge numbers of credentials exposed via not only high profile incidents like those suffered by Myspace, LinkedIn and Dropbox, but also from tens of thousands of smaller breaches," said Rick Holland, VP Strategy at Digital Shadows. "But it is critical that businesses arm themselves with the necessary intelligence and insight to manage their digital risk and prevent this problem credential exposure from escalating into an even more severe problem."
The report also suggests that while multi-factor authentication (MFA) can help to protect organizations and their customers from account takeovers, it cannot be seen as a silver bullet to solve the problem of account take overs.
"Enterprises - and the companies that work for and with them - need to be better prepared for this sort of brute force attack," added Holland.
Other steps businesses should take to protect against credential stuffing include:
Monitor for leaked credentials of your employees. Troy Hunt's https://www.haveibeenpwned.com is a great resource for this, alerting you to instances of breaches including your organization's email domain.
Monitor for mentions of your company and brand names across cracking forums. This can help to inform the security solutions you invest in. Use Google Alerts for this – Johnny Long some great tips for doing so (http://www.mrjoeyjohnson.com/Google.Hacking.Filters.pdf) and it can help identify the specific risks to your business.
Monitor for leaked credentials of your customers, allowing you to take a more proactive response.
Deploy an inline Web Application Firewall. Commercial and open source web application firewalls, like ModSecurity, can be used to identify and block credential stuffing attacks.
Increase user awareness. Educate your staff and consumers about the dangers of using corporate email address for personal accounts, as well as reusing passwords.
Gain an awareness of credential stuffing tools. Keep an eye on the development of credential stuffing tools, and of how your security solutions compare to their capabilities.
Implement multi-factor authentication that doesn't leverage SMS. This can help to reduce account takeovers, but make sure this is balanced against the friction it can cause. — SG


Clic here to read the story from its source.