Okta Alert: The Rise of Credential Stuffing Attacks Through Proxy Networks

Okta Alert: The Rise of Credential Stuffing Attacks Through Proxy Networks

According to Okta’s user warning, the availability of residential proxy services, stolen credentials, and scripting tools has led to an increase in credential-stuffing assaults that target online services.

The Okta research team noticed a rise in credential-stuffing attempts against Okta accounts between April 19 and April 26.

Tor network

Researchers at Okta Security Moussa Diallo and Brett Winterford have noticed that a similar element unites all of the recent attacks: a big portion of the requests are made using an anonymizing tool like Tor. 

Furthermore, the researchers discovered that millions of queries were sent via a variety of residential proxies, including Datalmpulse, Luminati, and NSOCKS. In technical terms, these residential proxies are “networks of legitimate user devices that route traffic on behalf of a paid subscriber.” 

How to strengthen defenses against attacks?

Additionally, Okta advises its customers to strengthen best-practice defenses against credential-stuffing attacks, which can lead to account takeovers.

According to Thomas Richards, principal consultant at Synopsys Software

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

Read the original article: