#credentialstuffing

Opalsec :verified:Opalsec@infosec.exchange
2025-04-05

Our latest post is out, check it out for the full details here 👉 opalsec.io/daily-news-update-s

If you're short on time, here's a quick rundown of the key stories:

🇦🇺 Australian Pension Funds Under Attack: A significant credential stuffing campaign hit multiple Aussie superannuation funds (Australian Super, REST, Hostplus, Insignia, ART) over the March 29-30 weekend. Attackers used stolen creds, likely targeting web portals and mobile apps, accessing accounts and unfortunately stealing funds in some cases (reports mention ~AU$500k from four Australian Super members alone). ASFA is coordinating the response. A stark reminder about password reuse and MFA effectiveness, especially during off-hours!

🏛️ Shake-up at NSA/Cyber Command: Big news out of the US – Gen. Timothy Haugh has been fired from his dual-hat role leading the NSA and USCYBERCOM after just over a year. Deputy Director Wendy Noble is also reportedly out. Reasons are murky, but speculation points towards political motivations (linked to Laura Loomer's visit with President Trump). This raises questions about stability, the ongoing 'Cybercom 2.0' review, and the future of the dual-hat structure, especially with ongoing nation-state threats.

⏱️ Incident Response Speed vs. Backups: An interesting debate highlighted recently – while backups are vital for recovery, is rapid IR potentially even more critical? It’s a tough balancing act: contain fast (risking tipping off attackers/losing evidence) or investigate thoroughly while the breach continues? Emphasises the need for skilled responders and adequate tooling, not just relying on backups as a silver bullet.

⚠️ Critical RCE in Apache Parquet (CVE-2025-30065): Heads up, data folks! A CVSS 10.0 RCE vulnerability has been found in the widely used Apache Parquet columnar storage format (up to v1.15.0). Given its use in Hadoop, AWS, Azure, GCP, and by major tech companies, the potential impact is huge. Patch to version 1.15.1 ASAP!

📱 Pentagon Probes Defense Secretary's Signal Use: The DoD's Inspector General is investigating Defense Secretary Pete Hegseth's use of Signal for official business. This follows a report where a journalist was accidentally added to a Signal chat discussing sensitive airstrike details (targets, timing). Raises concerns about classified info on unclassified apps, need-to-know, and record-keeping compliance.

The full blog post dives deeper into each of these stories and much more. Don't forget to sign up to our newsletter so you can get this daily wrap-up straight to your inbox!

📨 opalsec.io/daily-news-update-s

What are your biggest takeaways from this week's news? Let's discuss below!

#CyberSecurity #InfoSec #ThreatIntel #DataBreach #CredentialStuffing #Ransomware #Phishing #Vulnerability #ApacheParquet #NSA #CyberCommand #IncidentResponse #CloudSecurity #NationalSecurity #Espionage #Privacy

2025-04-04

Cybercriminals have exploited simple password reuse to drain AUD 500K from Australian pension funds. Is your retirement savings secure? Read on to uncover the vulnerabilities.

thedefendopsdiaries.com/cyber-

#cybersecurity
#credentialstuffing
#australianpensionfunds
#cyberattacks
#multifactorauthentication

Cyber Tips Guidecybertipsguide
2025-03-17

Cybersecurity Alert - New AI agents like OpenAI's Operator can amplify credential stuffing attacks. Implement robust MFA & stay informed to protect your digital identity.

Learn more - zurl.co/OSdAX

Steve Ragan (SteveD3) :verified:SteveD3@infosec.exchange
2024-12-19

Not sure who is playing around, but I don't use my Proton Mail account for things like this.

#credentialstuffing

An image from Keeper Security stating that: "A request has been received to login to Keeper with a new device, but a Keeper account with this email does not exist."
2024-12-04

Credential Theft is on the Rise! Our CPO Dan Featherman shares the inside scoop on infostealer malware, password spraying, brute force, and credential stuffing attacks, as well as how they are used to break into accounts and sensitive systems. lmgsecurity.com/the-insiders-g

#CyberSecurity #BruteForce #CredentialStuffing #IT #infostealermalware

2024-11-15

The complexity of the passwords I am seeing in this #credentialstuffing attack is depressing. Apparently we’ve learned nothing. #infosec

Prof. Dr. Dennis-Kenji Kipkerkenji@chaos.social
2024-07-08

#RockYou2024: Wohl bislang größter #Passwort #Leak - #Achtung an alle, die ihre #Passwörter wiederverwenden oder dasselbe Passwort für den gleichen Dienst nutzen! #CredentialStuffing

"Höchstwahrscheinlich enthält die neueste RockYou-Version Informationen aus über 4.000 Datenbanken, die man über mehr als zwei Jahrzehnte zusammengetragen hat. In der Zukunft muss man mit vielen weiteren Datenlecks rechnen."

tarnkappe.info/artikel/cyberan

2024-06-12

Battered and bruised 23andMe faces probe after hack that stole seven million users’ data - 23andMe, the California-based company which sells DNA testing kits to help people learn a... bitdefender.com/blog/hotforsec #credentialstuffing #databreach #guestblog #lawℴ #dataloss #23andme #dna

2024-05-06

Jako bych na to nedávno neupozorňoval u #credentialstuffing.
Příliš často recyklujeme hesla. A tady píší, že si je navíc někde poznamenáváme.
Což nemusí být úplně špatně, pokud je bezpečně zaznamenáte ve správci hesel.
Ať tak nebo tak, recyklace hesel je špatně a samotná hesla stejně nestačí.
techradar.com/pro/security/a-s

gtbarrygtbarry
2024-05-05

Okta warns of "unprecedented" credential stuffing attacks on customers

Okta warns of an "unprecedented" spike in credential stuffing attacks targeting its identity and access management solutions, with some customer accounts breached in the attacks

bleepingcomputer.com/news/secu

Marcus "MajorLinux" Summersmajorlinux@toot.majorshouse.com
2024-04-22

Time to mix up those passwords!

Roku hit by credential stuffing attack - Desk Chair Analysts

dcanalysts.net/roku-hit-by-cre

#CredentialStuffing #InfoSec #MFA #Passwords #Roku #Tech #DCA

"Roku hit by credential stuffing attack" text laid over the Roku logo.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst