Recently we’ve witnessed some pretty big password leaks. First, 6.4m unsalted passwords leaked from LinkedIn, then 500m passwords leaked from Yahoo, which today turned to 1 billion accounts. This is truly scary, even if you haven’t been using your Yahoo account. To see why let us go back a couple of months when I almost fell victim to a credential stuffing attack from China.
First of all, “credential stuffing” is a fancy name for password reuse. All it takes is somebody with very intermediate computer security knowledge, looking up the password dumps from Yahoo or LinkedIn (widely available), then trying the same exact credentials on as many different sites as possible until there is a match. In my case, I logged into my Steam account and saw something like this:
Unfortunately, Steam does not specify if this is a credential stuffing attempt, but it was only a week after the big LinkedIn leak. I may also have been reusing the same password for my LinkedIn and Steam, so all the pieces fit. Steam was very helpful in telling me the following:
At that time, I deeply appreciated all those otherwise annoying security features. Facebook asking me to identify my friends, Google sending me text messages, and now Steam using geolocation to see where my impersonator lives. I quickly updated my password on Steam and 5-6 other websites.
My new password was the same as the old one, with the last letter changed from a ‘d’ to an ‘e,’ meaning this was the 5th time I updated my Steam password for one or another reason. The rest of the password was pretty good in terms of entropy. Caps, lower cases, numbers, and symbols, randomly generated as well as pronounceable, using pwgen, a great CLI tool for generating strong, memorable passwords.
But this is not great overall. It’s only one step in the right direction for attackers to realize how hard it is to remember a password, which is why users opt to postfix their existing ones with predictable components, such as an increasing identifier. I’ve read posts about people using the same password everywhere and instead prefixing it with the site name. So if your main password is “d34db33f,” then for Amazon, it will be “amazon_d3adb33f”, for Chase, “chase_d3adb33f,” or something along those lines.
I believe I have a good understanding of the security concepts behind passwords, and I think I’m doing better in terms of passwords than 99% of the people out there since my password is not “password” or “123456” (proof). On the other hand, here I found myself coming up with predictable password patterns. Then it came to me, the bigger issue exposed by credential stuffing attacks and password reuse:
Either we all do passwords right, or nobody does.
Either nobody gets hacked, or we may as well all be, as long as users can’t help but use the same passwords and predictable patterns over and over again.
So what does it mean for everyone to do passwords right? If you want to be really safe, you’ve got to be a bit paranoid and lean completely on the side of security versus convenience.
It is indeed impossible to be truly secure using passwords. How about password managers, then? Letting them handle the complexity of passwords. Not a bad idea on first thought. Just tie all passwords to the user’s machine. But then you get this:
Password managers basically escalate the problem of cyber security to a problem of physical security of your devices. For example, if I can get my hands on an open laptop, I can access pretty much any website, as long as cookies are enabled or a password manager has been used. And that’s pretty terrible.
In the end, no solution takes care of every aspect of identity security today. It’s either what you know (password), what you have (device), and now we’re finally moving into the age of what you are.
At Prove, we think of the human as the central point of identity management. Think about every bit of information that makes you, You. How large is your stride, do you walk fast or slow, how long are your arms, which floor is your house at, how fast do you drive to work? This is all information that we feed into our machine learning system as input. The output is binary. Either it is you, or it isn’t. Since we only require 1-bit of information at the time of authentication, we can log you in with one click.
In addition, Prove works across devices. Your computer knows about your phone, and they share the same credentials. Remember that time when you left your laptop unattended for 5′, and your Facebook wall got full of questionable posts? Not anymore. We can detect when you stand up and walk away. We can do that for every website, bank, e-shop, and federal website. Take your identity with you when you leave the room.
Here at Prove, we take your security seriously. Passwords are an inconvenience, and they will soon go the way of the floppy drive. However, machine learning and implicit authentication can help you, and we know precisely how.
To learn about Prove’s identity solutions and how to accelerate revenue while mitigating fraud, schedule a demo today.
Join over 1,000 businesses that rely on Prove across multiple industries, including banking, FinTech, healthcare, insurance, and e-commerce. Contact us today.
Trusted by 1,000+ leading companies to reduce fraud and improve consumer experiences. Contact us today to learn how you can frictionlessly secure your digital consumer journey — from onboarding to ongoing transactions.
Tap the button below to read our latest white-paper on the subject as industry leaders.
Contact us to learn how leading companies are using Prove Pre-Fill to modernize the account creation process by shaving off clicks and keystrokes that kill conversion.
Get in touch to find out how we can help you identify your customers at every stage of their journey and offer them seamless and secure experiences.
Let our expert team guide you through our identity verification and authentication solutions. Select a date and time that works for you.
Find out how we can help you deliver seamless and secure customer experiences that comply with PSD2/SCA. Select a date and time that works for you.
Download Aite-Novarica Group’s full report about Prove Pre-Fill, including a product overview, customer results, and how the product works.
Download the guide now to learn how you can improve security, cut down on fraud, and create the best possible customer experience.