FBI Warns Of Residential Proxies Used In Credential Stuffing Attacks

Following the news that: 

FBI warns of residential proxies used in credential stuffing attacks

FBI warns of residential proxies used in credential stuffing attacks (bleepingcomputer.com)

Subscribe
Notify of
guest

2 Expert Comments
Most Voted
Newest Oldest
Inline Feedbacks
View all comments
Nick Rago
Nick Rago , Field CTO
InfoSec Expert
September 12, 2022 1:16 pm

The August 18, 2022 FBI notification about the use of residential proxies should serve as a good reminder to all that protection against a credential stuffing attack requires more than just an IP reputation check. Organisations should employ adequate contextual runtime detection capability in order to quickly identify nefarious client behaviour, regardless of where the request originated. Advancements in AI security technologies allow security teams to detect and block behaviours that deviate from the norm in near real-time, before any damage is done. The ability to rapidly discern client intent and identify threats based on behaviour has been a game changer for many organisations. In many cases, threats are identified during reconnaissance stages, before an actual attack is carried out.  The notification specifically calls out the threat to Mobile Applications, which typically leverage APIs to transfer data between the mobile app itself and application servers. As it relates to mobile app security, and securing the APIs they leverage, contextual runtime protection, as explained previously, is essential. Additionally, organisations should look to complement with appropriate API access controls such as service specific rate limits where appropriate, and requiring MTLS authentication between the mobile app and the underlying APIs it leverages.

Last edited 2 months ago by Nick Rago
Erich Kron
Erich Kron , Security Awareness Advocate
InfoSec Expert
September 8, 2022 1:05 pm

As much as we would like to get rid of passwords, we must admit that this form of authentication will be around for the foreseeable future. Because passwords are still a primary way to authenticate to computers and websites, it is important to educate people about the dangers of reusing passwords across multiple accounts, and to provide them a way to easily manage the multiple passwords that the typical person has.

Cybercriminals know that it is human nature to come up with a single strong password, then reuse it across multiple platforms. Without tools to help manage multiple passwords, there is simply no way for a person to memorize them, which leads to this reuse. Bad actors know that if they can extract the username and password from a breach, that the odds are good that many of them will also be used in other places, so they try them at major banks, email providers, social media platforms and even large retailers.

Enabling Multi-Factor Authentication (MFA) can help protect accounts, however, modern attackers can bypass these controls, so it should not be considered a fix to the problem. Password vault application can be very useful for creating and securing strong, unique passwords for accounts, helping significantly with the reuse problem. It is critical to secure the password vault with a unique and strong passphrase, and MFA whenever possible, and to be very protective of that password.

Last edited 2 months ago by Erich Kron
Information Security Buzz
2
0
Would love your thoughts, please comment.x
()
x