Stolen data has become a fact of everyday life, and credentials theft is all too common on today’s networks.
According to the Breach Level Index, approximately 3,320 records are lost or stolen every minute; that adds up to more than 4.7 million records each day. That means there’s a high probability, for individuals and organizations alike, that sensitive data will find its way into the wrong hands at some point.
When hackers score a large enough volume of passwords and other credentials, the breach often makes the headlines. Customers of the breached organization learn that their data has been compromised, and they’re warned that they should change their password for the affected website or service. However, these warnings rarely explain where the compromised data ends up and how cybercriminals make use of it.
A new report from Shape Security helps shed some light on what happens to stolen credentials and why it is such a concern.
Around 2.3 billion usernames and passwords were stolen in 2017, the report claims, and the frequency of spills has remained consistent over the past few years. One result of this leaked information has been $50 million in potential losses per day from “credential stuffing” attacks.
Credential stuffing, a favorite tactic among hackers, is a method for reusing stolen credentials. Hackers compile large volumes of usernames and passwords, which they use to attempt login at other sites. One startling indication of just how common these attacks are; 90 percent of login attempts at retail sites don’t come from users logging into their own accounts.
Many credential spills go unnoticed for a long period of time — 15 months on average, according to the Shape report. This leads to a couple of important takeaways for businesses and consumers:
- Take seriously the advice that passwords must not be reused across sites. This behavior opens the door to damage from credential stuffing attacks.
- Organizations need methods to discover credential spills. Monitoring the dark web, where hackers discuss their plans and publish stolen records, can be an extremely useful source.
Lunarline offers deep web surveillance to organizations that want to get a better handle on credential spillage. Our industry-leading experts employ our in-house dashboard tools, in addition to their years of experience, to dig up information that can mitigate damage from these incidents.
For more information on how Lunarline can help you clean up from a credential spill, contact us today!