<p><span data-contrast="none">The quarantine is tough, but for those who enjoy spending time at home, it </span><span data-contrast="none">isn&#8217;t</span><span data-contrast="none"> that bad. And what better way to spend countless hours at home than playing immersive video games? Game developers and publishers are reporting an increase in sales, which is </span><span data-contrast="none">excellent. Even though some game releases have been postponed due to everyone working from home.</span><span data-ccp-props="{";201341983";:0,";335559740";:276}"> </span></p>
<p><span data-contrast="none">There&#8217;s</span><span data-contrast="none"> one alarming trend in the game industry that, sadly, increased during the quarantine. </span><span data-contrast="none">That&#8217;s</span><span data-contrast="none"> hacking attacks directed against gamers. A</span><a href="https://portswigger.net/daily-swig/gamers-fragged-by-surge-in-credential-stuffing-attacks-during-lockdown#:~:text=Gamers%20as%20individuals%20are%20also,login%20pages%20of%20targeted%20sites."><span data-contrast="none">ccording to cybersecurity news at </span><span data-contrast="none">portswigger</span></a><span data-contrast="none">, there&#8217;s </span><span data-contrast="none">an increase in DDoS attacks, SQL injections, and credential stuffing. The last one &#8211; credential stuffing attack &#8211; is easily executable and is gaining in popularity due to decent financial gains.</span><span data-ccp-props="{";201341983";:0,";335559740";:276}"> </span><span data-contrast="none">Luckily, </span><span data-contrast="none">it&#8217;s</span><span data-contrast="none"> very easy to defend against, so we&#8217;d like to e</span><span data-contrast="none">xplain to you what credential attack is, and how you can protect your gaming accounts.</span><span data-ccp-props="{";201341983";:0,";335559740";:276}"> </span></p>
<h4 style="text-align: center;"><strong>What is a Credential Stuffing Attack?</strong></h4>
<p><span data-ccp-props="{";201341983";:0,";335559740";:276}"> <a href="https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/credential-stuffing-attacks-vs-brute-force-attacks-showcase_image-8-p-2767.jpg"><img class="aligncenter size-large" src="https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/credential-stuffing-attacks-vs-brute-force-attacks-showcase_image-8-p-2767.jpg" width="860" height="520" /></a></span></p>
<p><span data-contrast="none">First Credential stuffing attacks appeared in 2014 and over the last couple of years rapidly increased in popularity. In fact, th</span><span data-contrast="none">ey became so common that even the FBI in the United States </span><a href="https://www.documentcloud.org/documents/7208239-FBI-PIN-on-credential-stuffing-attacks.html?ref=hackernoon.com"><span data-contrast="none">released a Private Industry Notification</span></a><span data-contrast="none">, warning that the US finan</span><span data-contrast="none">cial sector became targeted by cybercriminals. And numerous password </span><a href="https://nordpass.com/free-password-manager/"><span data-contrast="none">privacy</span></a><span data-contrast="none"> cybersecurity companies are alerted to take better care of your online accounts.</span><span data-ccp-props="{";201341983";:0,";335559740";:276}"> </span></p>
<p>A Credential stuffing attack is a type of cyber attack that is surprisingly simple to execute. Typically, the attack involves four easy steps and requires minimal effort on the part of the attacker. The first step is for a significant number of username-password combinations to be leaked online from an insecure service, which unfortunately happens more often than it should. This leaked information is often sold on the Black markets of the web. Once a cybercriminal has obtained a dataset of leaked username-password combinations, which are known as combolists, they can use them in a Credential stuffing attack. To protect yourself against this type of attack, you may want to consider using a <a href="https://fully-verified.com/id-verification-service/">service from Fully-Verified</a> or another reputable provider, which can help you secure your login credentials and prevent unauthorized access to your accounts.</p>
<p><span data-contrast="none">Next step is to obtain an automation software, which can be purchased for several dollars. With the help of this </span><span data-contrast="none">software, the hacker then targets another service with leaked credentials, in hopes that the same username and password were reused. And if this turns out to be the case, the account is stolen and most often sold on the same black markets. </span><span data-ccp-props="{";201341983";:0,";335559740";:276}"> </span></p>
<p><span data-ccp-props="{";201341983";:0,";335559740";:276}"><a href="https://www.secureworldexpo.com/hubfs/credential%20stuffing.png"><img class="aligncenter size-large" src="https://www.secureworldexpo.com/hubfs/credential%20stuffing.png" width="667" height="422" /></a></span><span data-contrast="none">One of the mor</span><span data-contrast="none">e recent cases of successful credential stuffing attacks is the </span><a href="https://www.cpomagazine.com/cyber-security/new-disney-plus-streaming-service-hit-by-credential-stuffing-cyber-attack/"><span data-contrast="none">Disney+ case</span></a><span data-contrast="none">, which happened right after the launch. Cy</span><span data-contrast="none">bercriminals had a vast collection of </span><span data-contrast="none">combolists</span><span data-contrast="none">, and right after the release of this new popular streaming service, targeted it with acquired credentials. The success rate proved to be high, and soon Disney+ accounts were sold for half the price on online</span><span data-contrast="none"> Black Markets.</span><span data-ccp-props="{";201341983";:0,";335559740";:276}"> </span></p>
<p><span data-contrast="none">The crucial thing to notice is that this attack can only succeed if the same username-password was used. Sadly, password management is still a problem, and such easy-to-guess passwords as &#8220;qwerty&#8221; or &#8220;password&#8221; or &#8220;123456&#8221; are still used. </span><span data-contrast="none">And that is precisely why this attack became so popular. </span><span data-contrast="none">It</span><span data-contrast="none">’</span><span data-contrast="none">s</span><span data-contrast="none"> very easy to execute and requires little &#8220;hacking&#8221; in the traditional sense </span><span data-contrast="none">of the word. And lousy password management practices ensure this attack is profitable to a cybercriminal. </span><span data-ccp-props="{";201341983";:0,";335559740";:276}">Regularly change passwords and use a <a href="https://www.passwarden.com/password-checker">strong password checker</a> to keep them secure.</span></p>
<p><span data-contrast="none">Luckily, th</span><span data-contrast="none">ere are easy ways to protect yourself against these kinds of attacks, so go straight ahead to the next paragraph, where you can take the first steps to secure yourself online.</span><span data-ccp-props="{";201341983";:0,";335559740";:276}"> </span></p>
<h4 style="text-align: center;"><strong>How to Protect Yourself Against Credential Stuffing Attacks? </strong></h4>
<p><span data-contrast="none"> <a href="https://images.idgesg.net/images/article/2019/10/cso_many_keys_one_lock_by_petr_bonek_gettyimages-872739656_2400x1600-100815712-large.jpg"><img class="aligncenter size-large" src="https://images.idgesg.net/images/article/2019/10/cso_many_keys_one_lock_by_petr_bonek_gettyimages-872739656_2400x1600-100815712-large.jpg" width="1200" height="800" /></a>The first step, o</span><span data-contrast="none">bviously, is not to use the same username-password for different services. However, </span><span data-contrast="none">it&#8217;s</span><span data-contrast="none"> harder to do than it sounds, because we use so many other services these days, that there would be a need to remember hundreds of passwords. But password managers are </span><span data-contrast="none">there to help!</span><span data-ccp-props="{";201341983";:0,";335559740";:276}"> </span><span data-contrast="none">Password managers are cybersecurity software that was designed to store large amounts of long and complex passwords. Remembering a </span><span data-contrast="none">60 symbol</span><span data-contrast="none"> password with upper and lower case letters, and numbers can be challenging for the best of us. And </span><span data-contrast="none">remembering a lot of passwords like this is nearly impossible. </span><span data-ccp-props="{";201341983";:0,";335559740";:276}"> </span></p>
<p><span data-contrast="none">Password managers quickly rose to popularity. Not only do they boost your cybersecurity significantly, but they also provide a more comfortable browsing experience due to autofill function. Y</span><span data-contrast="none">ou can </span><span data-contrast="none">actually save</span><span data-contrast="none"> time when browsing with a password manager because you don&#8217;t have to type passwords anymore and import them straight from the manager with one click.</span><span data-ccp-props="{";201341983";:0,";335559740";:276}"> The <a href="https://www.deccanherald.com/brandpr/what-is-a-password-manager-for-mac-and-how-it-works-2773438">best password manager for Mac</a> is very useful to secure your various accounts.</span></p>
<p><span data-contrast="none">Another service </span><span data-contrast="none">we&#8217;d</span><span data-contrast="none"> advise using is a www.haveibeenpwnd.com website, that was creat</span><span data-contrast="none">ed by a prominent cybersecurity expert Troy Hunt. On it, you can check your email address for leaks so that you know which one of your passwords have been exposed and can change it to a more secure one.</span><span data-ccp-props="{";201341983";:0,";335559740";:276}"> Using a disposable email address from <a href="https://10minute-email.com/">10 Minute Mail</a> to register on websites, blogs, and forums keep your real one hidden from hackers&#8217; eyes, thereby improving email security. </span><span data-contrast="none">These steps do sound easy, but even small changes can be crucial and defend your account against a cybercriminal looking for an easy grab. And what could be worse than losing your steam account with all the games on it?</span><span data-ccp-props="{";201341983";:0,";335559740";:276}"> </span></p>
<p><span data-contrast="none">We hope this has been informative a</span><span data-contrast="none">nd will help some of you secure yourself online better!</span><span data-ccp-props="{";201341983";:0,";335559740";:276}"> </span></p>
<p style="text-align: center;"><em>This article contains sponsored links.</em></p>

BagoGames > Articles > Geek Culture > Tech > Credential Stuffing Attacks are Targeting Gamers
Credential Stuffing Attacks are Targeting Gamers
Here's a few easy steps to protect yourself
-
By Chris Newton

- Categories: Tech
- Tags: CredentialsHackersHackingLoginOnline SafetyPrivacySD
Related Content
MX Player for PC: Complete Setup Tutorial
By
Trevor Kincaid
October 22, 2025
Nacon Rig 600 PRO Gets Release Date
By
Michael Mosley
August 20, 2023