The first part of this report highlighted an often underestimated reality: credential stuffing does not rely on spectacular technical flaws, but on the reutilization of valid credentials obtained from leaks, sometimes dating back years. This characteristic makes it a persistent threat that is difficult to detect and perfectly compatible with otherwise well-secured infrastructures. Thus the question is no longer about understanding the phenomenon, but about identifying truly appropriate and efficient responses. However, in this area, many organizations try to set-up measures that appear reassuring, but  with a limited effectiveness when facing attacks designed to resemble legitimate use.

How can we fight against such a phenomenon? 

Moving away from a password-centered approach

The most common response to credential stuffing is to strengthen password complexity requirements. While necessary from an overall security perspective, this measure only addresses a marginal part of the problem. As we have seen, credential stuffing primarily exploits credentials that have already been compromised elsewhere. In this context, the theoretical complexity of the password is less important than its reuse. A long and complex password, used on multiple services, remains exploitable once it has been leaked.

A policy focused exclusively on the formal robustness of passwords has several limitations

  • it does not take into account the history of external compromises
  • it does not allow the identification of accounts exposed via third-party leaks
  • it gives a false sense of protection that does not correspond to the actual level of risk

The issue of credential stuffing therefore requires a change in perspective: it is no longer just about protecting a secret. You have to consider that this secret may already have been exposed elsewhere.

Multi-factor authentication: needed but not enough

Multi-factor authentication is one of the most effective ways to reduce the impact of credential stuffing. If the system requires a second factor, it limits significantly the direct exploitation of a compromised password. However, its effectiveness depends heavily on how it is implemented. Several factors determine the actual effectiveness of multi-factor authentication

  • the type of second factor used
  • the exceptions granted (trusted devices, long sessions)
  • the actual coverage of
  • the account base
  • the management of backup procedures

A second factor based on codes sent by SMS, for example, remains vulnerable to fraud or misuse. Similarly, optional multi-factor authentication, or multi-factor authentication limited to certain categories of users, still leaves a significant attack surface. And most importantly, multi-factor authentication does not eliminate credential stuffing, it only mitigates its consequences.

Combining indicators for improved detection

Traditional defense mechanisms are often designed to detect abnormal volumes of failed logins. However, in credential stuffing, attackers adjust their attacks to avoid these thresholds. A more effective approach is therefore to shift the focus to authentication behavior rather than just the number of failed attempts.

Several signals, that are weak when taken in isolation, can reveal an ongoing campaign

  • multiple attempts on a large number of separate accounts
  • inconsistencies between the geographic distribution of attempts and that of the known user population
  • unusual variations in the technical environments used
  • abnormal success rates followed by atypical activity

Taken separately, each of these indicators may seem unsignificant; when added together and analyzed collectively over time, however, they can identify patterns that characteristic of credential stuffing. This approach requires a more sophisticated ability to correlate and analyze behavior (and therefore greater technical and financial resources) than simple mechanisms that block repeated failed attempts.

Integrating leak data into risk management

An organization cannot control leaks that occur elsewhere. However, it can incorporate this reality into its own defense strategy. Continuous monitoring of compromised databases that are publicly available or via specialized partners makes it possible to identify potential exposures ahead of attacks. When an address associated with an internal account appears in a leak, the risk of credential stuffing automatically increases.

The specific issue of privileged accounts

Not all accounts are created equal. Privileged accounts are particularly attractive targets in credential stuffing campaigns, especially when they use addresses and passwords that are also used for personal purposes. Credential stuffing exploits the cross-functional nature of digital usage. The more an account is exposed to different environments, the more likely it is to be included in a leak. It is therefore necessary to regularly audit these accounts and only grant access to them if they are essential and, preferably, for a limited period of time.

Security policies that ignore actual user practices allow structural vulnerabilities to persist. Reuse of credentials, informal account sharing, proliferation of unlisted tools: these practices expand the attack surface far beyond the theoretical perimeter. The solution therefore lies in gaining a better understanding of actual digital usage, rather than hoping that users will be more disciplined than they really are. Credential stuffing reminds us that security must also be based on a detailed understanding of usage patterns. Check back soon on the blog for a new topic. If you have a movie, TV series, software, or e-book to protect, don’t hesitate to call on our services by contacting one of our account managers. PDN has been a pioneer in cybersecurity and anti-piracy for over ten years, and we are sure to have a solution to help you. Happy reading, and see you soon!

Share this article