June 15, 2019

June 14, 2019

Subscribe to Latest Legal News and Analysis

June 13, 2019

Subscribe to Latest Legal News and Analysis

Retailers: Protecting Against Credential Stuffing Attacks

It is no secret that the retail industry has suffered many devastating blows due to sophisticated cybersecurity attacks. Recently, retailers have been facing a new threat – “credential stuffing” attacks – in which hackers use stolen email addresses, user names, and passwords to attempt to break into corporations. So far in 2019, several large companies have suffered these attacks (some, multiple attacks).

Most recently, a giant Japanese retailer fell prey to a major attack where “more than 460,000 online customer accounts were fraudulently accessed between April 23 and May 10, 2019. Personal information that may have been exposed in the attack includes first and last names, full residential and shipping addresses, landline and mobile phone numbers, email address, gender, date of birth, purchase history, and partial credit card information including cardholder, expiration date, and part of credit card number.” See “Security breach hits apparel giant,” May 14, 2019. 

Unfortunately, many users unwittingly facilitate these attacks by repurposing their easily cracked passwords for multiple accounts.

What Are Credential Stuffing Attacks?

Hundreds of millions of email addresses and passwords sit on the dark web. Some are purchased and quickly used, while some are held and accumulated for further criminal use at a later date. In a credential stuffing attack, attackers use previously stolen addresses and passwords (called “credentials”), coupled with advanced, automated tools to attempt millions of log-ins to a customer- or consumer-facing website. Even if most attempts are thwarted, with millions of attempts, some are bound to succeed, allowing hackers to monetize their investments. According to an April 25 article (referencing a February 2019 report), 

‘with an investment of as little as $550, criminals could expect to earn at least 20 times the profit on the sale of compromised login credentials.’ [] For the $550, the crooks can get a $150 checking software, a leaked/stolen credentials database of roughly 100K user records, and enough proxies to run their credential attacks for $250/week….[The report notes] that ‘for every one million random combinations of emails and passwords, attackers can potentially compromise between 10,000 and 30,000 accounts. Moreover, the same database could then be reused over and over again to hack dozens of different websites, yielding even higher profits.’

See “The Anatomy of Highly Profitable Credential Stuffing Attacks.” 

The relatively small investment necessary to commence one of these infiltrations is demonstrated by the large numbers of attempted credential stuffing attacks. Indeed, the report “showed that approximately 28 billion credential stuffing attempts were detected between May and December 2018, retail websites being the main targets of credential abuse with 10 billion attempts.” (see “Credential Abuse per Day” chart in above-linked article).

What Can You Do About Credential Stuffing Attacks?

Given that databases are being left open to theft in the wild Internet ecosystem, these attacks will likely continue at a rapid pace, especially for retailers with customer-facing websites available for log in. To minimize the likelihood of a credential stuffing attack and the resultant damage, your company may wish to consider the following basic potential safeguards: 

  1. Use multi-factor or two-factor authentication, requiring the person signing in to spend an additional step to insert a code sent back to him or her (generally by text message).

  2. Check your logs to see if there are massive, failed attempts to log in. That is a tell-tale sign that an attacker is trying what might be millions of different passwords or email addresses to log in.

  3. In similar fashion, if there are multiple attempts to log in, you can limit login attempts to, for example, five per 15 minutes per IP address, or limit attempts to three, and then lock out that person/ID.

  4. Use the “I am not a robot” defensive tool called “Captcha.” Although requiring customers to select traffic light or storefront images may seem cumbersome, it can frustrate a credential stuffing attack.

  5. Implement a mandatory password reset if your company discovers its customers’ credentials have been stolen.

With millions of customers and accounts, retailers are a regular target for credential stuffing attacks. While the defensive measures retailers need to take to secure their networks seem endless, the safeguards to protect against a successful credential stuffing attack noted above are relatively easy to implement, and much easier than handling a data breach involving millions of customers.

©2019 Greenberg Traurig, LLP. All rights reserved.

TRENDING LEGAL ANALYSIS


About this Author

Paul Ferrillo Cybersecurity Attorney
Shareholder

Paul Ferrillo focuses his practice on cybersecurity corporate governance issues, complex securities and business litigation, and internal investigations. He assists clients with governance, disclosure, and regulatory matters relating to their cybersecurity postures and the regulatory requirements which govern them.

Paul represents public companies and their directors and officers in shareholder class and derivative actions, as well as in internal investigations. In particular, he has coordinated numerous internal investigations on behalf of audit committees and special committees...

212-801-9200