[state of the internet] / security - akamai...the executive summary of the 2018 state of the...

4
[state of the internet] / security CREDENTIAL STUFFING ATTACKS EXECUTIVE SUMMARY SOTI 2018

Upload: others

Post on 20-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: [state of the internet] / security - Akamai...The executive summary of the 2018 State of the Internet / Security - Credential Stuffing Attacks Web Attack report examines the latest

[state of the internet] / securityCREDENTIAL STUFFING ATTACKS

EXECUTIVE SUMMARY

S O T I 2 0 1 8

Page 2: [state of the internet] / security - Akamai...The executive summary of the 2018 State of the Internet / Security - Credential Stuffing Attacks Web Attack report examines the latest

2

Akamai secures and delivers digital experiences for the world’s largest companies. The globally distributed Akamai Intelligent Edge Platform™ surrounds everything, from the enterprise to the cloud, giving us unique insight into the state of our digital world. We process trillions of Internet transactions each day, allowing us to gather and analyze massive amounts of data on metrics related to threats and attacks, broadband connectivity, and media delivery. Akamai’s State of the Internet was created to help businesses and governments make better strategic decisions by leveraging this data and the insights it offers.

Virtually every business is impacted by credential stuffing botnets. The term “botnet” can be alarming, but everything from web crawlers to site scrapers to account takeover tools can be defined as a botnet. Many botnets can be described as beneficial or at least neutral, but credential stuffing botnets are exclusively malicious.

We are focusing primarily on the financial services industry in this report since, along with retail, it seems to be a prime target for credential stuffing attacks. With over 30 billion malicious login attempts from the beginning of November 2017 until the end of June 2018, it’s a necessary deep dive for us to take so businesses can protect their assets and those of their customers.

Between May and June 2018, Akamai detected more than 8.3 billion malicious login attempts. However, many botnets attempt to remain in stealth mode for as long as possible.

Our first attack examination looks at a financial services institution that experienced three botnets simultaneously trying to take advantage of their site. A loud and brash credential stuffing bot was the first thing to draw attention to the attacks, but it was what was found during the deeper review of the traffic that is the interesting part.

BUSINESS IMPLICATIONS

EDITOR’S OVERVIEW

Executive Summary

50K

40K

30K

20K

10K5K0K

46,057 Legitimate login requests/hour

8,723 Malicious login attempts/hour 797 Malicious login attempts/hour

Page 3: [state of the internet] / security - Akamai...The executive summary of the 2018 State of the Internet / Security - Credential Stuffing Attacks Web Attack report examines the latest

3

Akamai Security Research / Summer 2018

Malicious login

attempts detected

between May and

June 2018

8.3 Billion

50K

40K

30K

20K

10K5K0K

46,057 Legitimate login requests/hour

8,723 Malicious login attempts/hour 797 Malicious login attempts/hour

When the alarm was triggered for a spike in malicious logins, it was discovered that just one botnet wasn’t causing the chaos. While many companies would typically treat this like a DDoS attack, it became apparent to the business that they would need to look deeper into why this spike happened.

As we peeled back the layers, three botnets were discovered — and the most dangerous one was not the one with the biggest force. It was the one that had gone undetected for so long since it never rocked the Richter scale.

One reason many organizations don’t have stronger controls to prevent credential stuffing is that 70% of the people surveyed (Ponemon report, October 2017) believe the tools needed to defend against these attacks diminish the web experience of legitimate users. The tension between web teams and security teams often revolves around user experiences, with any control that impacts the user experience, and therefore conversion rates, facing an uphill battle from the start. Clearly, credential stuffing defenses need to able to function without introducing user lag to be successful.

The report covers not only this example, but also takes a closer look at credential stuffing as a trend and the types of bots to look out for, and an exploration into why the U.S. seems to be bearing the brunt of the worldwide credential stuffing trend.

Download the full report at akamai.com/SOTI.

Page 4: [state of the internet] / security - Akamai...The executive summary of the 2018 State of the Internet / Security - Credential Stuffing Attacks Web Attack report examines the latest

State of the Internet / Executive Summary

4

ABOUT AKAMAI

Akamai secures and delivers digital experiences for the world’s largest companies. Akamai’s intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart, and secure. Top brands globally rely on Akamai to help them realize competitive advantage through agile solutions that extend the power of their multi-cloud architectures. Akamai keeps decisions, apps and experiences closer to users than anyone — and attacks and threats far away. Akamai’s portfolio of edge security, web and mobile performance, enterprise access and video delivery solutions is supported by unmatched customer service, analytics and 24/7/365 monitoring. To learn why the world’s top brands trust Akamai, visit www.akamai.com, blogs.akamai.com, or @Akamai on Twitter. You can find our global contact information at www.akamai.com/locations or call 877-425-2624. Published 08/18.

Jose Arteaga, Akamai SIRT, Data Wrangler — Attack Spotlight Dave Lewis, Global Security Advocate — Operation Power Off Wilber Mejia, Akamai SIRT — Attack Spotlight Elad Shuster, Security Data Analyst Advanced DDoS — Akamai Blog David McEwan, Security Operations Command Center — Advanced DDoS Alejandro Ziegenhirt, Security Operations Command Center — Advanced DDoS

Martin McKeay, Senior Security Advocate, Senior Editor Amanda Fakhreddine, Sr. Technical Writer, Editor

Shawn Broderick and Sajeesh Alakkaparambil, Design Georgina Morales Hampe and Kylee McRae, Project Management

STATE OF THE INTERNET / SECURITY TEAM

EDITORIAL STAFF

CREATIVE