Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT/Embedded Security //

Botnet

9/24/2018
08:05 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Malicious Bot-Enabled, Credential-Stuffing Jamming Networks

A research report from Akamai finds the number of bot-enabled, credential-stuffing incidents has spiked in recent months, jamming networks with malicious traffic.

It turns out that there's even more bad bots jamming networks than originally thought.

Akamai Technologies looked at the more than 8.3 billion malicious login attempts from bots that occurred on its Intelligent Edge Platform between May and June of this year. The company has already seen approximately 3.2 billion malicious logins per month occur from January through April, and now researchers saw the number of attempts grow by 30% in a month.

Researchers were justifiably curious about what was going on out there. The results that they ended up with are now available as a new report: "2018 State of the Internet / Security -- Credential Stuffing Attacks Report."

In the report, Akamai researchers note that they "see a significant amount of credential stuffing traffic -- over 30 billion malicious login attempts from the beginning of November 2017 until the end of June 2018."

This ain't their first rodeo, buckaroo.

They found that bot-enabled credential stuffing can happen both fast and furious at the same time.

One case study they discuss involved a large credit union in North America. The incident started out as "internet noise," the kind of traffic resulting from scans or a non-targeted approach.

Suddenly, there was a greater than 10x increase spike in credential stuffing attempts. The report found 8,723 attempts per hour compared to approximately 800 malicious login attempts per hour that had routinely happened.

It just got worse from there.

Over the observed week, there were 315,178 malicious login attempts to the credit union from 19,992 IP addresses containing 4,382 different user agents from nearly 1,750 Autonomous System Numbers (ASNs).

While the growth in the unique IP addresses shows the breadth of the stuffing nodes used in the botnet, the additional number of user agents makes blocking a specific IP address hard. Also working against the effort to stop the distributed denial of service (DDoS) result of the stuffing traffic is that the attacker can just switch to another IP and evade your block.

But this kind of loud and noisy attack is only one variant.

There is the more dangerous "low and slow" attack. It may only average one malicious login attempt every other minute. The low traffic rate makes it harder to differentiate from background noise.

By escaping detection longer, the attack will have a better chance of finding vulnerable accounts to be stuffed.

The report found that the US was the primary source of stuffing originators, responsible for 2.82 billion attempts.

The US was followed by Russia, with 1.55 billion credential stuffing attempts. The remaining countries of the top ten offenders were each responsible for between 250 million and 165 million malicious login attempts apiece.

While there are two clear leaders, this points out that this is a global problem even though the makeup of the usernames and passwords contained in the dictionaries used by criminals will cause the US to be one of the first areas that will be attacked.

It may not matter defensively, since in 40% of the cases cited by Akamai, no one function has overall responsibility for dealing with the attacks. There seem to be an organizational lack of specifics for it, hence no one does it.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Mobile App Fraud Jumped in Q1 as Attackers Pivot from Browsers
Jai Vijayan, Contributing Writer,  7/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15105
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
CVE-2020-11061
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
CVE-2020-4042
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
CVE-2020-11081
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
CVE-2020-6114
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...