Palestinians uncertain as FIFA, UEFA step in to save soccer pitch from Israeli demolition    House panel votes to hold Clintons in contempt in Epstein probe    Trump backs off tariffs threat, says Greenland deal framework reached    Saudi Arabia signs agreement with World Economic Forum to accelerate industrial transformation    Over 78 million faithful visit Two Holy Mosques in a month    Saudi FM meets British, French counterparts in Davos    Northern Saudi cities record coldest temperatures of winter as mercury drops to –3°C    Arab coalition condemns deadly attack on Giants Brigades commander in Yemen    Sha'ban crescent sighted Tuesday    Saudi POS transactions reach 236 million, SR4bn in one week    Al-Khateeb highlights Saudi-UN partnership to shape quality of life in future cities    122 million tourists spend SR300 billion in Saudi Arabia in 2025    Italian fashion legend Valentino dies at 93    Saudi orchestra brings 'Marvels of Saudi Orchestra' to AlUla with 107 musicians    Katy Perry makes Saudi debut at Joy Awards, praises Saudi design and hospitality    Hail wins Guinness World Record with largest off-road production cars convoy    SFDA approves registration of 'Anktiva' for treatment of bladder and lung cancer    Saudi Darts Masters 2026 to offer record $200,000 prize for nine-dart finish    Al Taawoun condemn "repeated refereeing injustice" after late penalty defeat    British boxer Anthony Joshua discharged from hospital after Nigeria car crash    The key to happiness    Sholay: Bollywood epic roars back to big screen after 50 years with new ending    Ministry launches online booking for slaughterhouses on eve of Eid Al-Adha    Shah Rukh Khan makes Met Gala debut in Sabyasachi    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Password, username reuse major threat to enterprise security
Published in The Saudi Gazette on 04 - 06 - 2017

Cybercriminals are increasingly turning to credential stuffing tools to automate attempts at account takeover, Digital Shadows, the industry leader in digital risk management, revealed in its report into some of the main techniques cybercriminals are using to target organizations using stolen credentials which have been reused across a variety of sites and online forums.
"This is a type of brute force attack whereby large sets of credentials are automatically inserted into login pages until a match with an existing account is found. Based on configurations, the most common targets for these attacks are the gaming, technology, broadcasting and retail sectors," Digital Shadows said.
The report "Protect Your Customer and Employee Accounts: 7 Ways To Mitigate The Growing Risks Of Account Takeovers" also outlines what measures organizations can implement to protect against such attacks, said last year Digital Shadows found that 97% of businesses in the ‘Forbes 1000' had their valuable credentials exposed, usually by employees using the same details across multiple sites and platforms. Now criminals are recognizing that employees often have poor username and password discipline to use these in mass automated credential stuffing attacks aiming to gain access to corporate networks.
"Many organizations are suffering breach fatigue due to the huge numbers of credentials exposed via not only high profile incidents like those suffered by Myspace, LinkedIn and Dropbox, but also from tens of thousands of smaller breaches," said Rick Holland, VP Strategy at Digital Shadows. "But it is critical that businesses arm themselves with the necessary intelligence and insight to manage their digital risk and prevent this problem credential exposure from escalating into an even more severe problem."
The report also suggests that while multi-factor authentication (MFA) can help to protect organizations and their customers from account takeovers, it cannot be seen as a silver bullet to solve the problem of account take overs.
"Enterprises - and the companies that work for and with them - need to be better prepared for this sort of brute force attack," added Holland.
Other steps businesses should take to protect against credential stuffing include:
Monitor for leaked credentials of your employees. Troy Hunt's https://www.haveibeenpwned.com is a great resource for this, alerting you to instances of breaches including your organization's email domain.
Monitor for mentions of your company and brand names across cracking forums. This can help to inform the security solutions you invest in. Use Google Alerts for this – Johnny Long some great tips for doing so (http://www.mrjoeyjohnson.com/Google.Hacking.Filters.pdf) and it can help identify the specific risks to your business.
Monitor for leaked credentials of your customers, allowing you to take a more proactive response.
Deploy an inline Web Application Firewall. Commercial and open source web application firewalls, like ModSecurity, can be used to identify and block credential stuffing attacks.
Increase user awareness. Educate your staff and consumers about the dangers of using corporate email address for personal accounts, as well as reusing passwords.
Gain an awareness of credential stuffing tools. Keep an eye on the development of credential stuffing tools, and of how your security solutions compare to their capabilities.
Implement multi-factor authentication that doesn't leverage SMS. This can help to reduce account takeovers, but make sure this is balanced against the friction it can cause. — SG


Clic here to read the story from its source.