According to Okta’s user warning, the availability of residential proxy services, stolen credentials, and scripting tools has led to an increase in credential-stuffing assaults that target online services.
The Okta research team noticed a rise in credential-stuffing attempts against Okta accounts between April 19 and April 26.
Tor network
Researchers at Okta Security Moussa Diallo and Brett Winterford have noticed that a similar element unites all of the recent attacks: a big portion of the requests are made using an anonymizing tool like Tor.
Furthermore, the researchers discovered that millions of queries were sent via a variety of residential proxies, including Datalmpulse, Luminati, and NSOCKS. In technical terms, these residential proxies are “networks of legitimate user devices that route traffic on behalf of a paid subscriber.”
How to strengthen defenses against attacks?
Additionally, Okta advises its customers to strengthen best-practice defenses against credential-stuffing attacks, which can lead to account takeovers.
According to Thomas Richards, principal consultant at Synopsys Software
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.