TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

Fight Credential Stuffing by Taking a New Approach to Authorization

2017-05-31 · Read original ↗

ATT&CK techniques detected

3 predictions
T1110.004Credential Stuffing
90%
"fight credential stuffing by taking a new approach to authorization 2016 has been called “ the year of stolen credentials, ” and with good reason. between the massive breaches at yahoo, linkedin, myspace, tumblr, 1 twitter, 2 and dropbox, 3 just to name a few, it ’ s estimated th…"
T1110.004Credential Stuffing
85%
"use automated tools to test them in the login fields of other, targeted websites ( hence, the name credential “ stuffing ” ). when a username / password pair grants the attackers access, they take over that account for fraudulent purposes. by some estimates, as many as 90 % of al…"
T1525Implant Internal Image
67%
"to access spotify. in addition, tokens typically have a very short expiration time, so even if a token were to get stolen via a man - in - the - something attack, the potential damage an attacker could wreak would be limited in both time and scope of access. in the token - based …"

Summary

How a token-based authorization model can help organizations dramatically reduce credential stuffing attacks.