


In the above screenshot, you can manage, load, edit and save configs. Read morePart Two: The Current State of Bot Attacks The GUI is fairly basic, allowing for loading and saving of the configurations and basic editing of these configs. Part #1 – Building an Attack Configuration STORM comes as two executables one “config” builder GUI that aims to make the definition of the input files for a particular target easier, and the STORM utility itself which runs the ATO attacks. The version of STORM Cracker used for this analysis is version 2.4, released March of 2018. But what is STORM Cracker? Does it represent a significant change over the custom checkers and the established tools like Sentry MBA, or is it more of the same? This overview will aim to answer those and more questions. Sentry MBA is one of the older free tools now, with other paid for tools like Snipr, and many “ cracking” forums will even advertise free “ checkers” custom built for particular websites. The rest is up to the “cracker” and how willing they are to exploit the accounts they have access to. In this case, all an attacker requires to cause a security and data risk to any organisation is a pre-configured config for the target, a combo list of emails/usernames and passwords and a “proxy list” of open proxies to direct traffic through in order to evade IP banning and easy detection by law enforcement. This in combination with the proliferation of stolen or leaked databases has resulted in a recent surge in automated credential stuffing attacks, meaning organisations face round the clock threats from attackers. This new and emerging attack vector means unsophisticated actors can compromise your customer accounts with little to no knowledge of traditional hacking techniques. Credential Stuffing Tools – Account Takeover at The Click of a MouseĪccount Takeover/credential stuffing (Referred to as ATO from here) tools are readily available to download, with the most well-known weapon of choice selected by hackers being Sentry MBA.Ĭracking and Credential Stuffing tools have made ATO attacks extremely easy for even low-tech criminals to profit from automated attacks against any website of choice with little more than a few mouse clicks. How to protect your business from STORM Cracker?.Frequently Asked Questions about STORM Cracker.API and Mobile application API access points are also targeted.STORM Cracker can bypass DDoS protection offered by some of the leading CDNs.Should I be concerned about STORM Cracker?.

Part #1 – Building an Attack Configuration.Credential Stuffing Tools – Account Takeover at The Click of a Mouse.
