FB pixel

Digital ID attack mitigation sometimes just makes room for better criminals

Categories Access Control  |  Biometrics News
Digital ID attack mitigation sometimes just makes room for better criminals
 

A cybersecurity company says that successful mitigation of credential-stuffing attacks is not having precisely the effect identity providers might have expected.

A new F5 report illustrates how a baseline graph of malicious automation traffic – credential stuffing — gets squeezed to a fraction of its size after mitigation steps are completed. Yet the choked traffic is comprised of more dangerous, more sophisticated attack traffic.

A small but noticeable drop in traffic for authentication and account management end points occurs upon mitigation. But that is because criminals looking for the easiest marks find new targets and those able to wield intermediary and advanced tools mostly fill the void.

(F5 analyzes threats and markets tools and services to mitigate them.)

Among the advanced tools for performing credential stuffing attacks is software that mimics human-generated traffic.

F5 considers intermediate sophistication the ability to emulate some generic actions. Typically, they cannot simulate “full human browsing.”

Advanced capabilities use custom software as well as Selenium, Puppeteer, Browser Automation Studio. At this level, software is mimicking keystrokes, mouse movements and other actions.

The company makes several recommends in the report, including that identity providers not wait for the best anti-bot software. Simple applications can cut down basic stuffing attacks.

They need to deploy multi-factor authentication using public key cryptography like FIDO2 or FIDO2-based passkeys.

Reverse proxy phishing can bypass some MFA approaches, but F5 says those based on public key infrastructure, including most biometrics implementations, are resistant to these sophisticated attacks.

Article Topics

 |   |   |   |   | 

Latest Biometrics News

 

African nations making digital ID gains in the face of common challenges

Several countries in Africa are on the right track with their national digital ID projects, but this is not coming…

 

Digidentity enables remote onboarding registration for GMC doctors in UK

Healthcare continues to open up as a potentially major market for biometrics and reusable digital identity, as evidenced by the…

 

Explaining W3C Verifiable Credentials and biometrics a key mission for Dock Labs

All legitimate credentials can be verified – but not all credentials are Verifiable Credentials. It sounds a bit like a…

 

Ethiopia reveals strategy behind digital ID progress as ID4Africa 2025 opens

Ethiopia’s Fayda digital ID program successes were in the spotlight on the first day of ID4Africa 2025 in the country’s…

 

ID4Africa 2025 begins with record numbers, urgency and Ethiopian PM’s address

ID4Africa’s 2025 AGM kicked off today in Addis Ababa, Ethiopia, attended by Prime Minister Dr. Abiy Ahmed Ali and several…

 

DHS invites comments on new biometric sensor performance studies

The U.S. Department of Homeland Security (DHS) is inviting public comments on a proposed information collection initiative that is aimed…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events