Credential Stuffing How To Put An End To It
Credential Stuffing: How To Put An
End To It
-Mayur Rele
Credential Stuffing
Credential stuffing is one of the
most common cybersecurity
threats that many applications
face today.
Virtually, any application with a
login page is usually targeted for
credential stuffing.
2
The effect of credential stuffing
● Credential stuffing can be devastating as it is caused by breaching
another site.
● It is often used to commit fraud by making an unlawful purchase
from the account.
● The attacker can also resell the account in the black market or used
it to spread wrong information, malware, fake comment, and revies
on other platforms.
● This often destroys the image of many brands and leads to
financial damages.
3
Make use of multi-factor-
authentication
Multi-factor authentication is an
electronic authentication that
requires individuals to provide
two or more credentials before
their identity can be
authenticated in information
technology.
A good way put various
obstacles to hackers who might
want to penetrate your site and
ensure maximum
protection,”Mayur Rele says. 4
Adopt risk-based authentication
● Risk-base authentication is the application of stringency to the
authentication process.
● It is also used to calculate risk based on a built-in set of rules.this
are often related to the user’s identity details, geo-velocity, data
sensitivity, and many more.
● Risk-based authentication is often used when there is a high-risk
scenario and the site wants their customer to use customized
password security.
5
6
7
Comments