INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )

E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 9 NO. 4 2023
DOI: https://doi.org/10.56201/ijcsmt.v9.no4.2023.pg45.54


Effects of Credential Stuffing on Business Enterprises

Dr. Nwosu, John Nwachukwu


Abstract


This study examined the effects of credential stuffing on business enterprises. Credential stuffing is the act of gathering login credentials of people who use the same credentials across multiple digital assets. Once the login credential are obtained hackers can access emails and social media assets, make fraudulent purchases, and obtain personal information of the victim which they can use to launch attack. Data for study were collected from reports by reliable cyber security companies that include Microsoft Corporation, IBM, Google, F5 labs, Imperva and Crowdstrike Holdings Inc. The findings identified steps of credential stuffing to include the attacker obtaining leaked credentials from data breach, using software to test the stuffing against different websites and mobile applications, gaining access to the target’s system and taking over the digital assets of the victim to extract personal information, credit card detail, or email. The ways to prevent credential stuffing include avoiding the use of login credentials for multiple digital assets, strong and complex login credentials, multifactor authentication, regular security training of staff on threat identification, having cyber security experts as partners, establishing incident response team and using behavioural analytics smart devices.


keywords:

credential stuffing, cyber criminal, cyber attack, data breach and internet.


References:


Arcuri, M. C., Brogi, M. & Gandolf, G. (2017). How does cyber crime affect firms?
Retrieved from https://www.cour-ws.org on 6 th July 2023.

Auth0(2022). Credential stuffing is on a record pace. Retrieved from https://auth0.com/blog
Baker, K. (2023). Are there negative impacts of e-commerce?
Retrieved from https://www.beprofit.com on 9 th September 2023.

Blade (2023). Credential stuffing. Retrieved from https://www.blade.com on 13 th September
2023.
Brown, J. R. (2022). 6 ways cybercrime impacts business.
Retrieved from https://www.investopedia.com on 7 th August 2023.


DOWNLOAD PDF

Back