Kredentzialak betetzea ez da DDoS!

Kredentzialak betetzea ez da DDoS!

credential stuffing

Askotan entzun dut hori azken urteotan: norbaitek DDoS eraso handia jasaten ari da bere webgunean. Zer eraso mota jasaten ari diren galdetzen diedanean, erantzuna izan ohi da gaiztoek milaka edo milioika POST eskaera bidaltzen dituztela. Eskaera horiek nora bideratzen diren galdetzen dudanean, erantzuna izena emateko edo saioa hasteko orria izaten da!

Kredentzialak betetzeko erasoak ez dira HTTP flood DDoS erasoak eta askoz arriskutsuagoak dira. Eraso hauek milioika dolar kosta ditzake erakundeei datu galeran eta ospearen kaltetan. HTTP flood DDoS eraso batek webgune bat trafikoz gainezkatzen duen bitartean, zerbitzaria gainkargatzea eta huts egitea, kredentzialak betetzeko erasoa zibera-eraso bideratuagoa eta maltzuragoa da. Kredentzialak betetzeko eraso batean, Hacker-ek robot automatizatuak erabiltzen dituzte webguneko saio-orrietan lapurtutako milaka edo milioika erabiltzaile-izen eta pasahitz probatzeko, erabiltzaileei baimenik gabeko sarbidea lortzeko.’ kontuak. Gaur egun, lapurtutako egiaztagirien salmenta dira horietako bat most profitable businesses for criminals and those credentials are being used for credential stuffing attacks.

Unlike HTTP flood DDoS attacks, which are primarily aimed at disrupting website operations, credential stuffing attacks focus on stealing sensitive data, such as personal and financial data from compromised user accounts. These attacks can have a significant impact on a company’s bottom line as it can lead to data loss, regulatory damages, and even legal liability. Credential stuffing attacks can be particularly devastating for organizations that store sensitive customer data, such as financial sector, healthcare providers, and e-commerce companies. If a hacker gains access to your account, they can steal credit card information, social security numbers, and other sensitive data.

In addition to the direct economic losses from credential stuffing attacks, there are also indirect costs such as loss of customer trust and damage to an organization’s reputation. Bezeroek errezeloa izan dezakete datu-hausteek kaltetutako enpresekin negozioak egiteko, eta erasoekin lotutako publizitate negatiboa gainditzea zaila izan daiteke.

Kredentzialak betetzeko erasoetatik babesteko, erakundeek ezarri beharko lukete autentifikazio-neurri sendoak hala nola, faktore anitzeko autentifikazioa eta CAPTCHAak, automatizatutako robotek erabiltzaile-kontuetara baimenik gabe sartzea saihesteko. Era berean, zure sistema kontrolatu beharko zenuke jarduera susmagarrien zantzurik ez dagoenean eta erabiltzaileei modu proaktiboan ohartarazi kontua arriskuan jartzeko. Gertakariak erantzuteko plan sendo bat ere ezarri beharko litzateke gertaera hori gertatzen bada.

Post Disclaimer

The views, information, or opinions expressed are solely those of the author and do not necessarily represent those of his employer or the organizations with which he is affiliated.

The information contained in this post is for general information purposes only. The information is provided by Farhad Mofidi and while he strives to keep the information current and accurate, he does not make any representations or warranties of any kind, express or implied, regarding the completeness, accuracy, reliability, suitability or availability of the website. Farhad makes no representations or warranties. or any information, products or related graphics contained in any Post for any purpose.

Also, AI may be employed as a tool to provide suggestions and improve some of the contents or sentences. The ideas, thoughts, opinions, and final products are original and human-made by the author.

 

Leave a Reply

Your email address will not be published. Required fields are marked *