Sentry MBA Uses Credential Stuffing to Hack Sites
Shape Security warns of the growing threat of the hacking tool, which is able to bypass many modern IT defenses.Cyber-attackers use a lot of different tools, but one in particular is becoming increasingly effective as the collateral damage from Website breaches spreads. Shape Security today is warning about the dangers of the black market tool Sentry MBA (Modded by Artists) that is being used in widespread attacks known as credential stuffing. "The basic idea behind credential stuffing is that hackers are moving away from doing brute-force attacks, since the security industry is doing a reasonable job of blocking those attacks," Shuman Ghosemajumder, vice president at Shape Security, told eWEEK. With a brute-force attack, a hacker tries all possible combinations for an eight-digit password and eventually discovers the correct one. However, thanks to widespread use of password input restrictions, such that many sites and services will now block a user after three failed log-in attempts, brute force has fallen out of favor, Ghosemajumder said. Instead, there is a growing trend that Hewlett Packard Enterprise (HPE) has labeled collateral damage, where lists of credentials from compromised third-party sites are used to attack other sites. When attackers obtain lists of user credentials that were gleaned from other sites, they still need to figure out which credentials are valid and where else they can be used, he said. Attackers are increasingly using automation techniques to determine the tiny subset of credentials that can be reused on various sites, which is where Sentry MBA comes into play.
There are many credential stuffing tools, though in recent months Sentry MBA has emerged to become the most popular, according to Ghosemajumder. Among the reasons for its popularity is that it has a nice user interface and is a modular tool, he said. The modularity abstracts the credential stuffing functionality from the specific details of the Website a hacker is trying to attack. By way of Sentry MBA config modules, an attacker is able to tailor an attack to a specific Website, bypassing the specific defenses, including third-party security tools that may be in use on a targeted Website.