Credential stuffing is the automated injection of stolen username and password pairs (“credentials”) in to website login forms, in order to fraudulently gain access to user accounts.
Since many users will re-use the same password and username/email, when those credentials are exposed (by a database breach or phishing attack, for example) submitting those sets of stolen credentials into dozens or hundreds of other sites can allow an attacker to compromise those accounts too.
Edit: yeah it's just a brute force with less steps. That's fuckn embarrassing
"Credential Stuffing is a subset of the brute force attack category. Brute forcing will attempt to try multiple passwords against one or multiple accounts; guessing a password, in other words. Credential Stuffing typically refers to specifically using known (breached) username / password pairs against other websites."
Just because this method is a subset of the brute force attack doesn't mean that they don't have request limiting. They are reusing known breached passwords from other platforms, which makes it basically a guarantee that they will get the right password if they don't use a password manager. Their computer systems are secure, it's just their business model that's a privacy nightmare.
According to the quote they would've used breached passwords. You don't know anything about request limiting. It wasn't just randomly entering passwords unrestricted, as per your own quote.
Never re-use a password between services; every password for every system should be unique. Use a “password manager” to help.
Enable two-factor authentication (2FA) / multi-factor authentication (MFA) on any platform/service you can. It makes logging in a little longer but it makes these kinds of attacks much harder to pull off.
I do not know the solution. In a few years password managers will be seen as bad things, it's a collection of all your passwords ffs how is that really any safer?
If it's stored locally, has a strong password (it should be a very strong passphrase. I don't know how long mine is, but more than 40 characters), and is encrypted (which any good password manager should be), then it should be fine. I don't see any issue, at least not a reasonable alternative. Now using a password manager service that you're trusting with your data probably isn't a great idea.
I use KeepassXC. It's free and open source. The android app I use is KeepassDX, though there are others, and I use Synchthing to synchronize changes between devices.
I'm always astonished by the amount of information that people give away freely without securing it properly.
As for yet another billion dollar company's data being stolen... well... that's just a normal Friday. I'm not one for government intervention, especially considering how our governments act nowadays, but I seriously think that our privacy laws should be a lot more useful and a lot more severe.
I don't even know what this company was thinking, what goes through someone's brain to not stop for 20 seconds and think that storing this information unencrypted and just behind a simple login screen is a bad idea? Isn't it just blatantly obvious that they should've used e2e encryption? Require people to generate a key before they send their sample? Or if you want to make it moron proof, was it really impossible to write a unique seed phrase on each box and require users to type that to see their PRIVATE GENETIC INFORMATION?
I'm not anti capitalism, but the audacity of certain companies especially in the us is a sight to behold
We desperately need data privacy laws like the EU. I think a lot of people are totally ignorant w/ respect to what bad actors (whether they’re hackers or private companies) can actually do with their data.
GDPR is honestly not that good, it's a step in the right direction but it's not even close to being a decent solution.
We should consider implementing penalties harsh enough to actually incentivize behavioral change. Ideally, we’d see a system where a failure to reform would result in fines doubling each subsequent month, ensuring that even a giant like Google feels the sting, otherwise nothing is gonna change.
I contacted them to find out if my account was hacked and their automated system claimed they have not experienced a breach and then tried to connect me with an actual person.
It's been a few hours of "waiting for an agent" without progress so I'm giving up for the day. I think 23andme must be very busy with unhappy customers, or is massively understaffed.
Perfect example as to why you don't use the same password for every account you create on the internet. And use the same email address for everything you do. And like to use the same username on every site you sign up for.