
The modularity abstracts the credential stuffing functionality from the specific details of the Website a hacker is trying to attack. Among the reasons for its popularity is that it has a nice user interface and is a modular tool, he said. There are many credential stuffing tools, though in recent months Sentry MBA has emerged to become the most popular, according to Ghosemajumder. Attackers are increasingly using automation techniques to determine the tiny subset of credentials that can be reused on various sites, which is where Sentry MBA comes into play. When attackers obtain lists of user credentials that were gleaned from other sites, they still need to figure out which credentials are valid and where else they can be used, he said. Instead, there is a growing trend that Hewlett Packard Enterprise (HPE) has labeled collateral damage, where lists of credentials from compromised third-party sites are used to attack other sites. However, thanks to widespread use of password input restrictions, such that many sites and services will now block a user after three failed log-in attempts, brute force has fallen out of favor, Ghosemajumder said. With a brute-force attack, a hacker tries all possible combinations for an eight-digit password and eventually discovers the correct one.

“The basic idea behind credential stuffing is that hackers are moving away from doing brute-force attacks, since the security industry is doing a reasonable job of blocking those attacks,” Shuman Ghosemajumder, vice president at Shape Security, told eWEEK.

Shape Security today is warning about the dangers of the black market tool Sentry MBA (Modded by Artists) that is being used in widespread attacks known as credential stuffing.


Cyber-attackers use a lot of different tools, but one in particular is becoming increasingly effective as the collateral damage from Website breaches spreads.
