If there’s one thing that 2017’s high-profile data breaches confirmed, it’s that they aren’t just a headache for the hacked organization and its customers. Poor password practices—such as weak passwords and the reuse of passwords across multiple sites—make verified login credentials highly desirable on the black market.
The impact of account takeover on your business can reach far beyond your immediate financial losses—your customers will go elsewhere if you can’t keep their accounts safe, even if their poor password practices are a contributing factor. And the damage to your reputation can be irreparable. Unfortunately, legacy security tools, such as web application firewalls, are geared towards identifying the exploitation of software defects and aren’t necessarily designed to spot account takeover.
Automated Attacks are Fast and Repetitive
Automated tools allow cybercriminals to test the validity of username/password combinations stolen during data breaches much faster than a human being can. Sentry MBA, for example, is a common tool used in automated attacks. It is traded widely and freely on internet forums, is easy to configure and use, but can be extremely difficult to detect. That’s a real problem.
However, the rapid-fire nature of automated attacks can also help detect them: humans and robots have very distinct navigation paths, and web behavior analytics can be used to distinguish those patterns.
Web Behavior Analytics: Sort the Replicants from the Regular Shoppers
You can detect robotic access based on a variety of factors such as click speed, volume of clicks and unusual behavior e.g. (Read more...)
*** This is a Security Bloggers Network syndicated blog from RSA Blog authored by Heidi Bleau. Read the original post at: http://www.rsa.com/en-us/blog/2017-12/humans-vs-robots-automated-attacks-and-how-to-deal-with-them.html