chort ↙️↙️↙️ on Nostr: It may seem stupid, but password spraying (and credential stuffing) are a massive ...
It may seem stupid, but password spraying (and credential stuffing) are a massive threat.
SaaS providers and SaaS customers are sleeping on this issue. You might think password complexity will prevent this, but (LOL) no.
Attackers have access to huge botnets, or hundreds of cloud VMs. They have access to enormous residential proxy networks. It is absolutely possible to make hundreds of guesses for every one of your users per day for weeks until they get a match. Credential stuffing is even easier, since password reuse is so common.
You might also think that MFA would prevent this, but that's only true of phishing-resistant MFA. Once the attacker verifies working passwords, they can MFA fatigue bomb with push requests, or otherwise socially engineer those users.
Also the burden shouldn't be entirely on the customer. Every SaaS provider should treat this as a top tier threat and they should have automated systems to detect and block credential attacks, and they should all support adding multiple phishing-resistant authenticators to accounts, and require MFA by default.
Published at
2024-05-31 23:33:44Event JSON
{
"id": "42b4d7e6220028b3f7fb5758c6db648b3153dd6d5a0c133f6712d6d5359772c9",
"pubkey": "b823a122a2d38c09d8fb29ab750043c3ba2ea330c2c1b1426c376b08d1b6630b",
"created_at": 1717198424,
"kind": 1,
"tags": [
[
"proxy",
"https://infosec.exchange/@chort/112538315973229342",
"web"
],
[
"imeta",
"url https://media.infosec.exchange/infosec.exchange/media_attachments/files/112/538/290/008/670/177/original/25fb0843f1082f42.jpeg",
"m image/jpeg"
],
[
"proxy",
"https://infosec.exchange/users/chort/statuses/112538315973229342",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/chort/statuses/112538315973229342",
"pink.momostr"
]
],
"content": "It may seem stupid, but password spraying (and credential stuffing) are a massive threat.\n\nSaaS providers and SaaS customers are sleeping on this issue. You might think password complexity will prevent this, but (LOL) no.\n\nAttackers have access to huge botnets, or hundreds of cloud VMs. They have access to enormous residential proxy networks. It is absolutely possible to make hundreds of guesses for every one of your users per day for weeks until they get a match. Credential stuffing is even easier, since password reuse is so common.\n\nYou might also think that MFA would prevent this, but that's only true of phishing-resistant MFA. Once the attacker verifies working passwords, they can MFA fatigue bomb with push requests, or otherwise socially engineer those users.\n\nAlso the burden shouldn't be entirely on the customer. Every SaaS provider should treat this as a top tier threat and they should have automated systems to detect and block credential attacks, and they should all support adding multiple phishing-resistant authenticators to accounts, and require MFA by default.\nhttps://media.infosec.exchange/infosec.exchange/media_attachments/files/112/538/290/008/670/177/original/25fb0843f1082f42.jpeg\n",
"sig": "f5c5600f1b5e56d70c6c993f777abffa45fa3fe5edb3e8aca41ea48f29f8fc088d63f3c00cd919bce15e15e12cb7d1e1ab9ac6f595797334eb10e695ba5de3fe"
}