Checkers and Brute Forcers Highlight Dangers of Poor Password Management
Recorded Future analyzed current data from the Recorded Future® Platform, information security reporting, and other open source intelligence (OSINT) sources to identify checkers and brute forcers that facilitate threat actor campaigns. This report expands upon findings addressed in the report “Combating the Underground Economy’s Automation Revolution,” following the first report in this series, “Database Breaches Remains Top Cyber Threat for Organizations.” This report will be of most interest to network defenders, security researchers, and executives charged with security risk management and mitigation.
Executive Summary
Checkers and brute forcers are popular tools sold and shared on the criminal underground. Some are all-in-one, credential-stuffing attack platforms, while others are company-specific. These tools help unskilled cybercriminals launch an array of automated brute-forcing attacks against organizations’ sites, which they profit from by stealing financial and personal data, installing webshells and sniffers, or simply reselling access on the dark web.
One such tool, a new checker and brute forcer identified by Insikt Group, is profiled as “Big Brute Forcer” in this report. This tool is designed to target websites, web servers, website builders, e-commerce platforms, customer relationship management (CRM) systems, and other network protocols, such as File Transfer Protocol (FTP). Its ease of use and developer support enables cybercriminals who may lack necessary skills or intrusion infrastructure to gain access to e-commerce websites and platforms to steal customer data.
We also offer some mitigation strategies at the end of this report, such as suggestions for better password hygiene; as long as these strategies are not followed, cybercriminals will continue to find that checkers and brute forcers provide an easy way to steal data and turn a profit.
Key Judgments
- The industries most affected by cybercriminals using checkers and brute forcers are software, media and entertainment, e-commerce, finance, and telecommunications.
- Threat actors use automated checkers and brute forcers available on the criminal underground with the goal of validating accounts and gaining access to them.
- Password reuse and poor password-management hygiene remain among top issues enabling successful credential-stuffing attacks.
Background
Grâce aux identifiants obtenus à partir de violations de bases de données, les attaquants peuvent utiliser des vérificateurs et des outils de force brute pour mener des attaques par credential stuffing, dans le cadre desquelles ils envoient des demandes de connexion automatisées à grande échelle à des sites Web afin de déterminer la validité des comptes des victimes et d'obtenir un accès non autorisé. Avec un investissement de seulement 550 dollars, les criminels peuvent gagner au moins 20 fois plus grâce à la vente d'identifiants de connexion compromis. En 2019, Akamai a signalé avoir détecté plus de 3,5 milliards de tentatives de credential stuffing visant des institutions financières sur une période de 18 mois.
The majority of the checkers and brute forcers that Recorded Future analyzed in a 2019 report are still widely sold and used by criminals, with some that have been around since as far back as 2016. The continued effectiveness of these tools is in part due to poor password hygiene that allows threat actors to capitalize on password reuse.
There is no honor among thieves, and some of these checkers and brute forcers have been cracked, allowing any interested cybercriminal to use these tools at a cheaper price than offered by the original seller or completely free.
Checkers
Checkers are automated tools (scripts or software) used by cybercriminals to check the validity of user login credential combinations in bulk. Checkers may use the website’s main page, mobile app, or an application program interface (API) function to identify valid accounts.
Lors d'une attaque par credential stuffing, un acteur malveillant utilise une base de données contenant des noms d'utilisateur et des mots de passe fréquemment obtenus à la suite de violations de données. Par exemple, un pirate informatique aurait pu obtenir des identifiants lors de la violation de données de LinkedIn qui a compromis 170 millions de comptes en 2012 et qui ont été divulgués sur le dark web en 2016 (1 135 936 de ces comptes LinkedIn utilisaient le mot de passe « 123456 »). Un attaquant pourrait utiliser la combinaison adresse e-mail/mot de passe obtenue à partir de la violation de la base de données LinkedIn et vérifier si ces identifiants peuvent être utilisés pour accéder sans autorisation à d'autres comptes de victimes, tels que des comptes de messagerie ou des comptes bancaires. En effet, les acteurs malveillants savent que les utilisateurs réutilisent souvent les mêmes mots de passe sur plusieurs sites Web et plateformes. Les programmes de vérification automatisent et banalisent les attaques par « credential stuffing » afin de faciliter et d'accélérer l'accès aux comptes utilisateurs et aux informations personnelles identifiables (PII). En réalité, les vérifications peuvent être quatre fois plus nombreuses que les tentatives de connexion légitimes.
Brute Forcers
Brute forcers are automated password cracking tools used to gain access to user accounts through automated server requests. These tools attempt to guess and crack passwords or usernames using a trial and error method or via a dictionary attack, which helps attackers expedite guessing a password for a particular user or website. Partial information, such as a username obtained from a data dump, also makes it easier for an attacker to use a brute forcer to get the password.
Threat Analysis
Below are some notable breaches that emerged from successful credential-stuffing attacks:
- En juillet 2019, la société américaine de services bancaires et d'assurance State Farm a déclaré avoir été victime d'une attaque par « credential stuffing » au cours de laquelle un « acteur malveillant » a pu confirmer la validité de noms d'utilisateur et de mots de passe pour des comptes en ligne de State Farm.
- En janvier 2020, Ring, le fabricant de caméras intelligentes appartenant à Amazon, a été poursuivi en justice par une famille dont la caméra installée dans la chambre des enfants avait été piratée. Il semblerait que les criminels aient utilisé une liste de mots de passe courants pour pirater le compte Ring de la famille.
- Le 30 janvier 2020, TechCrunch a signalé une violation de données chez la compagnie aérienne indienne SpiceJet qui a affecté 1,2 million de passagers. Selon certaines informations, l'accès aux systèmes internes de SpiceJet aurait été obtenu en forçant le mot de passe du système, qui était facile à deviner.
Ces types d'attaques ont encore plus de chances de réussir si les victimes réutilisent les mêmes informations de connexion (nom d'utilisateur et mot de passe) sur plusieurs plateformes en ligne. Selon une étude menée par l'Université de Californie du Sud, « la réutilisation des mots de passe est très répandue et indiscriminée ; 98% des utilisateurs réutilisent leurs mots de passe à l'identique et 84% réutilisent un mot de passe important sur un site non important et probablement moins sécurisé ; les principales causes de la réutilisation des mots de passe sont une mauvaise compréhension des risques et la préférence pour la mémorisation plutôt que pour la sécurité ».
Les secteurs les plus touchés par les cybercriminels utilisant des outils de vérification et de force brute sont les logiciels, les médias et le divertissement, le commerce électronique, la finance et les télécommunications. L'image ci-dessous présente les secteurs touchés sur une période de six mois, d'après des sources provenant du dark web.
Industries targeted by checkers and brute forcers. (Recorded Future)
Cybercriminals will commonly use lists containing thousands of credentials with automated custom and “off-the-shelf” tools available on the dark web. Many tools support an unlimited number of custom plugins, known as “configs,” which allow cybercriminals to target almost any company with an online presence and conduct account takeovers. There are also lesser-known tools built to target single high-profile companies (like Netflix, Facebook, Instagram, and Spotify). If an organization sees a checker advertised for their particular brand or entity, it may be a precursor to an increase in credential-stuffing attacks against them.
These automated tools help attackers use compromised usernames and passwords against a range of accounts, including banking, e-commerce, loyalty or rewards programs, social media, and online cryptocurrency wallets. Once the attackers obtain access to an account, they try to drain available funds and rewards points, steal personal and financial details (such as credit card data), or commit fraud and identity theft. For automated brute-forcing tools, attackers will often use a list of common passwords with the most common combinations first.
Many forums on the criminal underground have sections specifically devoted to the sale and discussion of brute forcers and checkers. One such forum we observe has thousands of threads dedicated to credential-stuffing attacks and sales of checker software, and it’s no wonder why: According to forum discussions, it only takes one checker tool 90 seconds to check a database of 5,400 email addresses and return successful login and password combinations to the attacker. That tool is sold on the criminal underground for only $12.
Without tools like these, threat actors would have to create their own tools or configure existing ones, create or rent a botnet to launch attacks from, and rent bulletproof servers to host their attack infrastructure.
A Closer Look at 1 Brute Forcer
One example tool we found on the criminal underground, which we will call “Big Brute Forcer,” comes in two versions: the “Basic” for $1,000, and the “Pro” for $2,500. The more expensive “Pro” version provides the buyer with an entire toolset and infrastructure for account checking and brute forcing. We chose this specific tool because of its novelty, impact on businesses, and automation capabilities.
Big Brute Forcer employs a botnet to perform brute-force attacks, which distributes the computational workload across multiple machines and allows login attempts from multiple IPs. The use of multiple IPs in mass brute forcing allows cybercriminals to mask any single origin of attack by attempting to access victim accounts from hundreds of different IP addresses. Big Brute Forcer has features that make it particularly easy, even for unskilled cybercriminals, to launch an array of brute-force attacks against websites and online resources in an automated fashion:
- Big Brute Forcer is a web-based application, providing the buyer with various options to launch brute-force attacks without a need to open a command line or any specialized technical knowledge.
- Big Brute Forcer comes with technical support for installation and configuration.
- The buyer can either use their own list of domains for the control panel or use one supplied by the developer of Big Brute Forcer to control their attacks.
- Big Brute Forcer comes with preloaded dictionaries of password combinations from various breaches to use in attacks.
- Cybercriminals can create their own Big Brute Forcer botnet, or rent a premade one from its developer.
- The developer offers and operates bulletproof hosting services that can be purchased directly.
In the past, threat actors would have needed multiple manual steps to launch a successful brute-force attack. They would have to gather or purchase compromised credentials, compile the lists of domains and subdomains to attack, configure their tool of choice — often requiring a certain level of technical skill — create a botnet to launch attacks from, and finally, rent servers from bulletproof hosters to host their control panel. In addition, many tools used in credential-stuffing attacks require configuration files that define a target’s parameters, all of which Big Brute Forcer can also provide.
The tool’s graphical user interface is also simple and easy for inexperienced users. It allows viewing the progress of brute forcing, the speed of compromises, and statistics of successful and failed access attempts. Furthermore, the user can pivot directly to the lists of thousands of usernames and passwords along with the links to the login portals of breached accounts. With administrative access to these websites, cybercriminals can then steal customer PII and payment card data. Big Brute Forcer even offers to install webshells and backdoors to infect and steal directly from the compromised websites.
The developer also provides detailed YouTube videos on how to configure Big Brute Forcer functionality to expedite the client’s setup process. One video, for example, gives step-by-step instructions of how to breach websites, showing dozens of breached websites in the process. As the threat actor uploads the lists of domains and subdomains, in less than half an hour, Big Brute Forcer returns lists of cracked login and password details, which the developer uses to log in to those websites in real time.
Among victimized companies shown in the video are e-commerce and entertainment websites, as well as travel agencies with customer PII and financial data. Big Brute Forcer indiscriminately breaches websites and online resources based in various regions, including Europe, the United States, Asia, and Brazil. In one instance, the developer of Big Brute Forcer shows how they access the website of a New Zealand-based security company that emphasizes the need for good security and highlights its own commitment to protecting their clients’ security. Notably, this company’s admin panel login was easily guessable, with “admin” as a username and the company’s name as a password
Mitigation Strategies
- Increase awareness among the users within your organization to use unique passwords for each of their accounts. A password manager would help end-users generate, store, and retrieve unique and complex passwords.<
- Require additional details (for example, CAPTCHA, or user’s last name) during the login process to break the attacker’s programmed logic in automated credential-stuffing attacks.
- Use multi-factor authentication (MFA) if possible. While MFA will not prevent brute-forcing or checking attacks from occurring, it provides an extra layer of security such that any attempt to login by a malicious threat actor will be hindered by that extra layer of authentication.
- Establish customized web application firewall rules, with special attention to unusual header orders and user-agents, as well as checking for valid referrers.
- Intentionally slow down and rate limit login traffic to discourage attackers. For example, lock out accounts after a certain number of failed login attempts or introduce a delay in server responses to login requests.
- Remove unused public-facing login paths and tighten controls on mobile and API login paths.
- Baseline traffic and network requests to monitor web service for unexpected traffic, including volume and request type.
- Use Recorded Future to monitor criminal underground communities for the availability of new configuration files targeting your organization, acquisition, and for a thorough analysis of such files for additional attack indicators.
- Use Recorded Future to surface compromised credentials from database breaches, and once identified, take appropriate action to address the threat.
- Veuillez toujours stocker les mots de passe des clients dans un format haché. Ne les laissez jamais en clair. Dans le cadre de l'algorithme de hachage, intégrez une valeur de sel qui ne peut pas être facilement dérivée par un attaquant. Bien que les hachages soient irréversibles, l'absence d'intégration d'une valeur de sel permet aux attaquants de comparer les hachages à des bases de données publiques contenant des hachages de mots de passe courants.
Outlook
Cybercriminals will continue to use checkers and brute forcers because of the success they have had with gaining unauthorized access to user accounts and the profits they make from selling cracked accounts on the underground economy. This practice will continue to threaten companies and individual users until better password hygiene practices and security measures are implemented. Recorded Future continually monitors checkers and brute forcers advertised and discussed on the dark web to inform the clients on ways to enhance their mitigation strategies. Using the Recorded Future platform, clients can identify tools targeting their brand or entity, which may indicate that there will be an increase in attacks against them.