WEBINAR
How Credential Stuffing Tools Are Made

In early 2020, attackers compromised over 160,000 Nintendo accounts via credential stuffing. SpyCloud researchers discovered source code for one account checker tool that was custom-built to help criminals test stolen credentials against Nintendo logins, enabling attackers to access customer accounts and exploit saved payment methods to purchase in-game currency.
With so many people stuck at home, popular consumer services like Nintendo are facing high demand – from both legitimate customers and cybercriminals. Sophisticated crimeware makes it easy for criminals to target these types of organizations in credential stuffing attacks and defraud their customers. To protect consumers from account takeover, enterprises need to take proactive measures.
View this on-demand webinar to learn:
- How credential stuffing works, from the lifecycle of stolen credentials to the crimeware attackers use to automate account takeover
- Why stolen accounts that don’t have obvious monetary value can be profitable for cybercriminals
- How credential stuffing and account takeover fit into the broader criminal economy
- What your enterprise can do to combat both credential stuffing and more advanced types of account takeover attacks
Solution: Account Takeover Prevention
Reset stolen passwords before criminals can use them To defraud your users or access sensitive corporate data.
Watch the Webinar:
How Credential Stuffing Tools Are Made

Presenter Info
Chip Witt, Vice President of Product Management
Chip Witt has nearly twenty years of diverse technology experience, including product management and operations leadership roles at Hewlett Packard Enterprise, Webroot, VMware, Alcatel, and Appthority. He is currently the VP of Product Management and oversees the Customer Success Program at SpyCloud. Chip works closely with field intelligence teams specializing in OSINT and HUMINT tradecraft, actor attribution and underground monitoring.
A few of our happy customers:

Related Resources

Considerations for Choosing an Account Takeover Security Solution
This CSO whitepaper provides a guide to the best practices for evaluating how well each approach works, including a checklist of topics to discuss with each vendor being evaluated.

Targeted vs. Automated Account Takeover Attacks
Account takeover can be highly-targeted, sophisticated, and manual, or it can be high-volume and automated. Learn how to protect your enterprise from both types of ATO.

Account Takeover 101
You can’t stop ATO until you understand it. Get this plain-English primer on the latest attack methods, bad habits that increase ATO risk, and strategies for prevention.
The SpyCloud Difference
Truly Actionable Recaptured Data
SpyCloud solutions are backed by the world’s most current and comprehensive repository of recaptured data from breaches, malware infections, and other underground sources – with billions of exposed credentials and PII. It’s the same data that fraudsters use, but we make it actionable to prevent account takeover, ransomware attacks, and online fraud.
Check Your Exposure
See your real-time breach exposure details powered by SpyCloud data.