this post was submitted on 06 Oct 2023
354 points (98.6% liked)

News

36118 readers
3066 users here now

Welcome to the News community!

Rules:

1. Be civil


Attack the argument, not the person. No racism/sexism/bigotry. Good faith argumentation only. This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban. Do not respond to rule-breaking content; report it and move on.


2. All posts should contain a source (url) that is as reliable and unbiased as possible and must only contain one link.


Obvious biased sources will be removed at the mods’ discretion. Supporting links can be added in comments or posted separately but not to the post body. Sources may be checked for reliability using Wikipedia, MBFC, AdFontes, GroundNews, etc.


3. No bots, spam or self-promotion.


Only approved bots, which follow the guidelines for bots set by the instance, are allowed.


4. Post titles should be the same as the article used as source. Clickbait titles may be removed.


Posts which titles don’t match the source may be removed. If the site changed their headline, we may ask you to update the post title. Clickbait titles use hyperbolic language and do not accurately describe the article content. When necessary, post titles may be edited, clearly marked with [brackets], but may never be used to editorialize or comment on the content.


5. Only recent news is allowed.


Posts must be news from the most recent 30 days.


6. All posts must be news articles.


No opinion pieces, Listicles, editorials, videos, blogs, press releases, or celebrity gossip will be allowed. All posts will be judged on a case-by-case basis. Mods may use discretion to pre-approve videos or press releases from highly credible sources that provide unique, newsworthy content not available or possible in another format.


7. No duplicate posts.


If an article has already been posted, it will be removed. Different articles reporting on the same subject are permitted. If the post that matches your post is very old, we refer you to rule 5.


8. Misinformation is prohibited.


Misinformation / propaganda is strictly prohibited. Any comment or post containing or linking to misinformation will be removed. If you feel that your post has been removed in error, credible sources must be provided.


9. No link shorteners or news aggregators.


All posts must link to original article sources. You may include archival links in the post description. News aggregators such as Yahoo, Google, Hacker News, etc. should be avoided in favor of the original source link. Newswire services such as AP, Reuters, or AFP, are frequently republished and may be shared from other credible sources.


10. Don't copy entire article in your post body


For copyright reasons, you are not allowed to copy an entire article into your post body. This is an instance wide rule, that is strictly enforced in this community.

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] hamster@kbin.social 80 points 2 years ago (1 children)

https://owasp.org/www-community/attacks/Credential_stuffing

Credential stuffing is the automated injection of stolen username and password pairs (“credentials”) in to website login forms, in order to fraudulently gain access to user accounts.

Since many users will re-use the same password and username/email, when those credentials are exposed (by a database breach or phishing attack, for example) submitting those sets of stolen credentials into dozens or hundreds of other sites can allow an attacker to compromise those accounts too.

[–] doppelgangmember@lemmy.world 27 points 2 years ago* (last edited 2 years ago) (3 children)

So they brute forced the login?

No request limiting?

Wtf

Edit: yeah it's just a brute force with less steps. That's fuckn embarrassing "Credential Stuffing is a subset of the brute force attack category. Brute forcing will attempt to try multiple passwords against one or multiple accounts; guessing a password, in other words. Credential Stuffing typically refers to specifically using known (breached) username / password pairs against other websites."

[–] spookedbyroaches@lemm.ee 12 points 2 years ago (1 children)

Just because this method is a subset of the brute force attack doesn't mean that they don't have request limiting. They are reusing known breached passwords from other platforms, which makes it basically a guarantee that they will get the right password if they don't use a password manager. Their computer systems are secure, it's just their business model that's a privacy nightmare.

[–] doppelgangmember@lemmy.world 1 points 2 years ago

I mean true, there's nothing you can do with a successful attempt.

But i feel like this still could have been limited. Required 2FA obvi comes to mind... You can limit rate in a lot of ways.

[–] PixxlMan@lemmy.world 3 points 2 years ago (1 children)

According to the quote they would've used breached passwords. You don't know anything about request limiting. It wasn't just randomly entering passwords unrestricted, as per your own quote.

[–] doppelgangmember@lemmy.world 1 points 2 years ago

Okay 2FA then. Limit it somehow

[–] KillAllPoorPeople@lemmy.world 1 points 2 years ago* (last edited 2 years ago) (1 children)

Limits aren't a concern if you're controlling a bunch of zombies. The big guys usually have thousands if not hundreds of thousands of 'em.

[–] doppelgangmember@lemmy.world 1 points 2 years ago

Mandatory 2FA.

Easy.