Sunday, December 6, 2020
  • Phishing Attacks on Your Brand are Unrelenting, AI is the Only Way to Fight Back
  • Germany’s Anti-Semitic Phonetic Alphabet
  • DEF CON 28 Safe Mode Aerospace Village – Allan Tart’s & Fabian Landis’ ‘Low Cost VHF Receiver’
  • XKCD ‘Contiguous 41 States’
  • DEF CON 28 Safe Mode Aerospace Village – Matt Gaffney’s ‘MITM: The Mystery In The Middle’

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • MediaOps Inc.
    • DevOps.com
    • Container Journal
    • Digital Anarchist
    • SweetCode.io
  • Media Kit

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Application Security Security Bloggers Network 

Home » Cybersecurity » Application Security » Cracking Passwords and Taking Over User Accounts

Cracking Passwords and Taking Over User Accounts

by Ben Zilberman on July 23, 2020

Last week, a social media platform announced that many of its high-profile user accounts were compromised. While  such compromises can typically be traced  to cyber crime, that will not be the focus of this blog. Instead, let’s talk about the importance of securing user accounts, which is applicable to both individuals as well as organizations of any type that maintain consumer accounts.

How Are Accounts Breached?

There are several ways accounts can be breached, each of which have their unique, corresponding detection challenges. Per the OWASP list of Automated Threats to web applications, these include:

  • Credential Cracking (a.k.a. Bruteforce) – Hackers identify valid login credentials by trying different values for usernames and/or passwords. The detection challenge: A “stupid” bot will do it repeatedly until rate limited. A smarter one will maintain long intervals (even days) between attempts, thus flying (or more like walking!) under the radar.
  • Credential Stuffing – Mass login attempts used to verify the validity of stolen username & password pairs. The detection challenge: Understanding that even though the credentials are valid, this particular login attempt is of a malicious intent.
  • Account Creation – Create multiple accounts for subsequent misuse. The detection challenge: Many bots can mimic real user behavior and deceive conventional security solutions.
  • Account Aggregation – Used by an intermediary application that collects together multiple accounts and interacts on their behalf. The detection challenge: The malicious intent of this application is to consolidate a profile based on a digital footprint by collecting data from multiple sources (you may think of it like the initial, automated part of social engineering or an identity theft). Detection requires activity-tracking and event correlation, which coerces a big and rich data lake.

[You may also like: Malicious Bots Have Realized Your APIs Are the Weak Link]

The impacts of account takeover are serious, and include fraudulent transactions and abuse of rewards programs (which in turn can cause a loss of revenue and sabotage customer loyalty efforts), and damage to brand reputation (which also can result in lost revenue and undermines customers’ confidence).

Secure Practices

The good news is that you have control over protecting your – or your customers’ – accounts. For starters, having the right bot manager in place can help block illegal account access before fraudulent transactions can occur, as well as sophisticated account takeover attacks. What’s more, following these simple steps will substantially increase the level of security – and help you outsmart the hackers (the number one rule):

[You may also like: 4 Verticals Most Targeted by Bad Bots]

  1. Password hygiene – Use complex passwords, not dictionary words, a mix of numbers, letters and special characters. And above all – make it loooong. Many bruteforce attacks are testing 6,8- & 10-character length passwords. Any additional character exponentially increases the number of possible combinations, which requires more compute power from the bot.
  2. Endpoint security – Mobile phones, home routers, IoT devices and many hardware pieces come with poor built-in security and the ways to compromise them are easy and known. Once compromised, malware can be installed and no matter how complex your password is, a key logger can steal it. So be aware and if you can, get more secured equipment. Alternatively, secure it yourself by managing access and installing a comprehensive endpoint protection. Lastly, make sure to change admin credentials as many hackers are breaking in simply by using the factory default.
  3. Deploy sophisticated detection tools – As an organization, you are in charge of securing your customer data and maintaining the unwritten treaty of trust you were granted. Today unfortunately, such sophisticated bots that takeover accounts can mimic real user behavior, rotate their IP addresses or device IDs, bypass CAPTCHA and other challenges and eventually trick conventional security solutions. These bots target websites, mobile applications and APIs.

How the Pandemic Plays a Role

Compromised accounts have been traded for financial gain for years. Email addresses, passwords and credentials are low-hanging fruit, as they are relatively cheaper and go in masses. Payment details are another favorite, second to the aforementioned “fruit,” with prices dictated by different parameters such as country of issue, credit score and more. And at the highest end, there are medical records.

[You may also like: Recommendations for Managing a Bad Bot Problem]

During the pandemic, stealing and subsequently selling data from compromised accounts has become even more attractive for cyber delinquents. They are using malicious bots to achieve three main objectives:

  • Steal medical records, especially of those infected with the novel coronavirus
  • Get a hold of medical research (for instance, by way of credentials or accounts of staff)
  • Spreading spam and fake news

Were you personally compromised? If so, you may want to read our previous blog, What Should You Do When Your Identity Has Been Compromised?

Read Radware’s “The Big Bad Bot Report” to learn more.

Download Now


Recent Articles By Author
  • 4 Approaches to Securing Containerized Applications
  • Value Stream Mapping & Security in Software Development
  • Malicious Bots Have Realized Your APIs Are the Weak Link
More from Ben Zilberman

*** This is a Security Bloggers Network syndicated blog from Radware Blog authored by Ben Zilberman. Read the original post at: https://blog.radware.com/security/2020/07/cracking-passwords-and-taking-over-user-accounts/

July 23, 2020July 23, 2020 Ben Zilberman account takeover, bot management, Bots, credential, credential cracking, Cyber Security, owasp, security
  • ← Simple Malware Obfuscation Techniques
  • A Look Back at the Impact Live 2020: Our Largest Impact Yet →

TechStrong TV – Live

Watch latest episodes and shows
Featured Blog

Eric Kedrosky

The Future of Multi-Cloud Security: A Look Ahead at Intelligent Cloud Security Posture Management Solutions

Michael Clark

Prevent Catastrophic Data Loss in the Cloud

Rich Gardner

CISO Roundtable: What We’ve Heard, and What We’re Looking Forward To

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

Brazil Govt’s Huge Leak: Health Data of 243M
Securing the Office of the Future
California Federal Court Weighs In (Again) on Social Media Scraping
Web App Security: Don’t Let the Code Injection Grinch Steal Holiday Joy
U.S. Election Security (and Insecurities)
Drupal Core: Behind the Vulnerability
The Future Of Work: The Hybrid Workforce
VMware Horizon Architecture: Planning Your Deployment
There’s a RAT in my code: new npm malware with Bladabindi trojan spotted
“Free” Symchanger Malware Tricks Users Into Installing Backdoor

Upcoming Webinars

Mon 07

The Battle for Container Security

December 7 @ 1:00 pm - 2:00 pm
Tue 08

XDR (Extended Detection and Response): The Next Generation of Protection

December 8 @ 11:00 am - 12:00 pm
Thu 10

Data Security for Contact Centers Leveraging Cloud Technologies

December 10 @ 3:00 pm - 4:00 pm
Mon 14

Issues and Answers in Cloud Security

December 14 @ 1:00 pm - 2:00 pm
Tue 15

3 Things to Get Right for Successful DevSecOps

December 15 @ 3:00 pm - 4:00 pm
Wed 16

Unsolved Problems in Open Source Security

December 16 @ 11:00 am - 12:00 pm
Wed 16

Securing Medical Apps in the Age of COVID-19: How to Close Security Gaps and Meet Accelerated Demand

December 16 @ 1:00 pm - 2:00 pm
Wed 16

Deliver your App Anywhere … Publicly or Privately

December 16 @ 3:00 pm - 4:00 pm
Thu 17

Secure Your Peace of Mind and Your Mobile App While Giving Developers Back Their Happy Coding Time

December 17 @ 11:00 am - 12:00 pm
Thu 17

Solving Kubernetes Security Challenges Using Red Hat OpenShift and Sysdig

December 17 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

The Dangers of Open Source Software and Best Practices for Securing Code

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Why Hackers Love the Pandemic
Cybersecurity Data Security Industry Spotlight Security Boulevard (Original) 

Why Hackers Love the Pandemic

December 4, 2020 Chris Hallenback | 2 days ago 0
Security and COVID-19: Securing the New Normal
Cybersecurity Data Security Industry Spotlight Network Security Security Boulevard (Original) 

Security and COVID-19: Securing the New Normal

December 3, 2020 DAVID CANELLOS | 3 days ago 0
Web App Security: Don’t Let the Code Injection Grinch Steal Holiday Joy
Cybersecurity Industry Spotlight Security Boulevard (Original) Threats & Breaches 

Web App Security: Don’t Let the Code Injection Grinch Steal Holiday Joy

December 2, 2020 Ameet Naik | 4 days ago 0

Top Stories

Brazil Govt’s Huge Leak: Health Data of 243M
Application Security Cloud Security Cyberlaw Cybersecurity Data Security Featured News Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

Brazil Govt’s Huge Leak: Health Data of 243M

December 4, 2020 Richi Jennings | 1 day ago 0
Second Swiss Firm Said to Be CIA Encryption Puppet
Analytics & Intelligence Cyberlaw Cybersecurity Featured News Security Boulevard (Original) Spotlight Threat Intelligence 

Second Swiss Firm Said to Be CIA Encryption Puppet

November 30, 2020 Richi Jennings | Nov 30 0
Unisys Adds Visualization Tools to Stealth Platform
Cybersecurity Featured Network Security News Security Boulevard (Original) Spotlight 

Unisys Adds Visualization Tools to Stealth Platform

November 30, 2020 Michael Vizard | Nov 30 0

Security Humor

via  the comic delivery system monikered  Randall Munroe  resident at   XKCD  !

XKCD ‘Contiguous 41 States’

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2020 MediaOps Inc. All rights reserved.

Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.