Checkers and Brute Forcers Highlight Dangers of Poor Password Management

Checkers and Brute Forcers Highlight Dangers of Poor Password Management

Recorded Future analyzed current data from the Recorded Future® Platform, information security reporting, and other open source intelligence (OSINT) sources to identify checkers and brute forcers that facilitate threat actor campaigns. This report expands upon findings addressed in the report “Combating the Underground Economy’s Automation Revolution,” following the first report in this series, “Database Breaches Remains Top Cyber Threat for Organizations.” This report will be of most interest to network defenders, security researchers, and executives charged with security risk management and mitigation.

Executive Summary

Checkers and brute forcers are popular tools sold and shared on the criminal underground. Some are all-in-one, credential-stuffing attack platforms, while others are company-specific. These tools help unskilled cybercriminals launch an array of automated brute-forcing attacks against organizations’ sites, which they profit from by stealing financial and personal data, installing webshells and sniffers, or simply reselling access on the dark web.

One such tool, a new checker and brute forcer identified by Insikt Group, is profiled as “Big Brute Forcer” in this report. This tool is designed to target websites, web servers, website builders, e-commerce platforms, customer relationship management (CRM) systems, and other network protocols, such as File Transfer Protocol (FTP). Its ease of use and developer support enables cybercriminals who may lack necessary skills or intrusion infrastructure to gain access to e-commerce websites and platforms to steal customer data.

We also offer some mitigation strategies at the end of this report, such as suggestions for better password hygiene; as long as these strategies are not followed, cybercriminals will continue to find that checkers and brute forcers provide an easy way to steal data and turn a profit.

Key Judgments

Background

Grâce aux identifiants obtenus à partir de violations de bases de données, les attaquants peuvent utiliser des vérificateurs et des outils de force brute pour mener des attaques par credential stuffing, dans le cadre desquelles ils envoient des demandes de connexion automatisées à grande échelle à des sites Web afin de déterminer la validité des comptes des victimes et d'obtenir un accès non autorisé. Avec un investissement de seulement 550 dollars, les criminels peuvent gagner au moins 20 fois plus grâce à la vente d'identifiants de connexion compromis. En 2019, Akamai a signalé avoir détecté plus de 3,5 milliards de tentatives de credential stuffing visant des institutions financières sur une période de 18 mois.

The majority of the checkers and brute forcers that Recorded Future analyzed in a 2019 report are still widely sold and used by criminals, with some that have been around since as far back as 2016. The continued effectiveness of these tools is in part due to poor password hygiene that allows threat actors to capitalize on password reuse.

There is no honor among thieves, and some of these checkers and brute forcers have been cracked, allowing any interested cybercriminal to use these tools at a cheaper price than offered by the original seller or completely free.

Checkers

Checkers are automated tools (scripts or software) used by cybercriminals to check the validity of user login credential combinations in bulk. Checkers may use the website’s main page, mobile app, or an application program interface (API) function to identify valid accounts.

Lors d'une attaque par credential stuffing, un acteur malveillant utilise une base de données contenant des noms d'utilisateur et des mots de passe fréquemment obtenus à la suite de violations de données. Par exemple, un pirate informatique aurait pu obtenir des identifiants lors de la violation de données de LinkedIn qui a compromis 170 millions de comptes en 2012 et qui ont été divulgués sur le dark web en 2016 (1 135 936 de ces comptes LinkedIn utilisaient le mot de passe « 123456 »). Un attaquant pourrait utiliser la combinaison adresse e-mail/mot de passe obtenue à partir de la violation de la base de données LinkedIn et vérifier si ces identifiants peuvent être utilisés pour accéder sans autorisation à d'autres comptes de victimes, tels que des comptes de messagerie ou des comptes bancaires. En effet, les acteurs malveillants savent que les utilisateurs réutilisent souvent les mêmes mots de passe sur plusieurs sites Web et plateformes. Les programmes de vérification automatisent et banalisent les attaques par « credential stuffing » afin de faciliter et d'accélérer l'accès aux comptes utilisateurs et aux informations personnelles identifiables (PII). En réalité, les vérifications peuvent être quatre fois plus nombreuses que les tentatives de connexion légitimes.

Brute Forcers

Brute forcers are automated password cracking tools used to gain access to user accounts through automated server requests. These tools attempt to guess and crack passwords or usernames using a trial and error method or via a dictionary attack, which helps attackers expedite guessing a password for a particular user or website. Partial information, such as a username obtained from a data dump, also makes it easier for an attacker to use a brute forcer to get the password.

Threat Analysis

Below are some notable breaches that emerged from successful credential-stuffing attacks:

Ces types d'attaques ont encore plus de chances de réussir si les victimes réutilisent les mêmes informations de connexion (nom d'utilisateur et mot de passe) sur plusieurs plateformes en ligne. Selon une étude menée par l'Université de Californie du Sud, « la réutilisation des mots de passe est très répandue et indiscriminée ; 98% des utilisateurs réutilisent leurs mots de passe à l'identique et 84% réutilisent un mot de passe important sur un site non important et probablement moins sécurisé ; les principales causes de la réutilisation des mots de passe sont une mauvaise compréhension des risques et la préférence pour la mémorisation plutôt que pour la sécurité ».
Les secteurs les plus touchés par les cybercriminels utilisant des outils de vérification et de force brute sont les logiciels, les médias et le divertissement, le commerce électronique, la finance et les télécommunications. L'image ci-dessous présente les secteurs touchés sur une période de six mois, d'après des sources provenant du dark web.

Industries targeted by checkers and brute forcers. (Recorded Future)

Cybercriminals will commonly use lists containing thousands of credentials with automated custom and “off-the-shelf” tools available on the dark web. Many tools support an unlimited number of custom plugins, known as “configs,” which allow cybercriminals to target almost any company with an online presence and conduct account takeovers. There are also lesser-known tools built to target single high-profile companies (like Netflix, Facebook, Instagram, and Spotify). If an organization sees a checker advertised for their particular brand or entity, it may be a precursor to an increase in credential-stuffing attacks against them.

These automated tools help attackers use compromised usernames and passwords against a range of accounts, including banking, e-commerce, loyalty or rewards programs, social media, and online cryptocurrency wallets. Once the attackers obtain access to an account, they try to drain available funds and rewards points, steal personal and financial details (such as credit card data), or commit fraud and identity theft. For automated brute-forcing tools, attackers will often use a list of common passwords with the most common combinations first.

Many forums on the criminal underground have sections specifically devoted to the sale and discussion of brute forcers and checkers. One such forum we observe has thousands of threads dedicated to credential-stuffing attacks and sales of checker software, and it’s no wonder why: According to forum discussions, it only takes one checker tool 90 seconds to check a database of 5,400 email addresses and return successful login and password combinations to the attacker. That tool is sold on the criminal underground for only $12.

Without tools like these, threat actors would have to create their own tools or configure existing ones, create or rent a botnet to launch attacks from, and rent bulletproof servers to host their attack infrastructure.

A Closer Look at 1 Brute Forcer

One example tool we found on the criminal underground, which we will call “Big Brute Forcer,” comes in two versions: the “Basic” for $1,000, and the “Pro” for $2,500. The more expensive “Pro” version provides the buyer with an entire toolset and infrastructure for account checking and brute forcing. We chose this specific tool because of its novelty, impact on businesses, and automation capabilities.

Big Brute Forcer employs a botnet to perform brute-force attacks, which distributes the computational workload across multiple machines and allows login attempts from multiple IPs. The use of multiple IPs in mass brute forcing allows cybercriminals to mask any single origin of attack by attempting to access victim accounts from hundreds of different IP addresses. Big Brute Forcer has features that make it particularly easy, even for unskilled cybercriminals, to launch an array of brute-force attacks against websites and online resources in an automated fashion:

In the past, threat actors would have needed multiple manual steps to launch a successful brute-force attack. They would have to gather or purchase compromised credentials, compile the lists of domains and subdomains to attack, configure their tool of choice — often requiring a certain level of technical skill — create a botnet to launch attacks from, and finally, rent servers from bulletproof hosters to host their control panel. In addition, many tools used in credential-stuffing attacks require configuration files that define a target’s parameters, all of which Big Brute Forcer can also provide.

The tool’s graphical user interface is also simple and easy for inexperienced users. It allows viewing the progress of brute forcing, the speed of compromises, and statistics of successful and failed access attempts. Furthermore, the user can pivot directly to the lists of thousands of usernames and passwords along with the links to the login portals of breached accounts. With administrative access to these websites, cybercriminals can then steal customer PII and payment card data. Big Brute Forcer even offers to install webshells and backdoors to infect and steal directly from the compromised websites.

The developer also provides detailed YouTube videos on how to configure Big Brute Forcer functionality to expedite the client’s setup process. One video, for example, gives step-by-step instructions of how to breach websites, showing dozens of breached websites in the process. As the threat actor uploads the lists of domains and subdomains, in less than half an hour, Big Brute Forcer returns lists of cracked login and password details, which the developer uses to log in to those websites in real time.

Among victimized companies shown in the video are e-commerce and entertainment websites, as well as travel agencies with customer PII and financial data. Big Brute Forcer indiscriminately breaches websites and online resources based in various regions, including Europe, the United States, Asia, and Brazil. In one instance, the developer of Big Brute Forcer shows how they access the website of a New Zealand-based security company that emphasizes the need for good security and highlights its own commitment to protecting their clients’ security. Notably, this company’s admin panel login was easily guessable, with “admin” as a username and the company’s name as a password

Mitigation Strategies

Outlook

Cybercriminals will continue to use checkers and brute forcers because of the success they have had with gaining unauthorized access to user accounts and the profits they make from selling cracked accounts on the underground economy. This practice will continue to threaten companies and individual users until better password hygiene practices and security measures are implemented. Recorded Future continually monitors checkers and brute forcers advertised and discussed on the dark web to inform the clients on ways to enhance their mitigation strategies. Using the Recorded Future platform, clients can identify tools targeting their brand or entity, which may indicate that there will be an increase in attacks against them.