<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to detect credential stuffing attacks with SAS Fraud Management software in Fraud, AML and Security Intelligence</title>
    <link>https://communities.sas.com/t5/Fraud-AML-and-Security/How-to-detect-credential-stuffing-attacks-with-SAS-Fraud/m-p/793183#M805</link>
    <description>&lt;P&gt;&lt;SPAN&gt;In a credential stuffing attack, stolen user name and password combinations are used to attempt multiple logins at a different organization, usually with a botnet. With as many as &lt;A title="February 2019 Google/Harris Poll Online Security Survey" href="https://services.google.com/fh/files/blogs/google_security_infographic.pdf" target="_blank" rel="noopener"&gt;65% reusing the same password for multiple or all accounts&lt;/A&gt;, it is important for organizations to have layered protection against these attacks. The&amp;nbsp;fraudster only needs a small percentage of "hits" across a list of millions or billions of credentials to make the attack worthwhile.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are several ways &lt;A title="SAS Fraud Management" href="https://www.sas.com/en_us/software/fraud-management.html" target="_blank" rel="noopener"&gt;SAS Frau&lt;/A&gt;&lt;SPAN&gt;&lt;A title="SAS Fraud Management" href="https://www.sas.com/en_us/software/fraud-management.html" target="_blank" rel="noopener"&gt;d Management&lt;/A&gt;&amp;nbsp;software rules could be used to detect credential stuffing attacks. For example, customer profiles could be developed to detect anomalies in customer logon behavior, lists of compromised email addresses could be collected from public data dumps and put in a lookup list to heighten the&amp;nbsp;risk of logons on any potentially compromised accounts, and the flexibility of the rule response can be&amp;nbsp;used to layer in additional authentication steps.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A title="Credential Stuffing Attacks" href="https://support.sas.com/content/dam/SAS/support/en/technical-papers/credential-stuffing-attacks.pdf" target="_blank" rel="noopener"&gt;This technical paper&lt;/A&gt; examines how SAS Fraud Manager software can&amp;nbsp;track logon attempts from different user IDs occuring on a device in a short period of time. Instructions for software rule parameters and rule actions are provided.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A title="Credential Stuffing Attacks" href="https://support.sas.com/content/dam/SAS/support/en/technical-papers/credential-stuffing-attacks.pdf" target="_blank" rel="noopener"&gt;Read the technical paper now&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 28 Jan 2022 18:39:11 GMT</pubDate>
    <dc:creator>LizGoldberg</dc:creator>
    <dc:date>2022-01-28T18:39:11Z</dc:date>
    <item>
      <title>How to detect credential stuffing attacks with SAS Fraud Management software</title>
      <link>https://communities.sas.com/t5/Fraud-AML-and-Security/How-to-detect-credential-stuffing-attacks-with-SAS-Fraud/m-p/793183#M805</link>
      <description>&lt;P&gt;&lt;SPAN&gt;In a credential stuffing attack, stolen user name and password combinations are used to attempt multiple logins at a different organization, usually with a botnet. With as many as &lt;A title="February 2019 Google/Harris Poll Online Security Survey" href="https://services.google.com/fh/files/blogs/google_security_infographic.pdf" target="_blank" rel="noopener"&gt;65% reusing the same password for multiple or all accounts&lt;/A&gt;, it is important for organizations to have layered protection against these attacks. The&amp;nbsp;fraudster only needs a small percentage of "hits" across a list of millions or billions of credentials to make the attack worthwhile.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are several ways &lt;A title="SAS Fraud Management" href="https://www.sas.com/en_us/software/fraud-management.html" target="_blank" rel="noopener"&gt;SAS Frau&lt;/A&gt;&lt;SPAN&gt;&lt;A title="SAS Fraud Management" href="https://www.sas.com/en_us/software/fraud-management.html" target="_blank" rel="noopener"&gt;d Management&lt;/A&gt;&amp;nbsp;software rules could be used to detect credential stuffing attacks. For example, customer profiles could be developed to detect anomalies in customer logon behavior, lists of compromised email addresses could be collected from public data dumps and put in a lookup list to heighten the&amp;nbsp;risk of logons on any potentially compromised accounts, and the flexibility of the rule response can be&amp;nbsp;used to layer in additional authentication steps.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A title="Credential Stuffing Attacks" href="https://support.sas.com/content/dam/SAS/support/en/technical-papers/credential-stuffing-attacks.pdf" target="_blank" rel="noopener"&gt;This technical paper&lt;/A&gt; examines how SAS Fraud Manager software can&amp;nbsp;track logon attempts from different user IDs occuring on a device in a short period of time. Instructions for software rule parameters and rule actions are provided.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A title="Credential Stuffing Attacks" href="https://support.sas.com/content/dam/SAS/support/en/technical-papers/credential-stuffing-attacks.pdf" target="_blank" rel="noopener"&gt;Read the technical paper now&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jan 2022 18:39:11 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Fraud-AML-and-Security/How-to-detect-credential-stuffing-attacks-with-SAS-Fraud/m-p/793183#M805</guid>
      <dc:creator>LizGoldberg</dc:creator>
      <dc:date>2022-01-28T18:39:11Z</dc:date>
    </item>
  </channel>
</rss>

