The Art of Credential Stuffing

Adversaries leverage many different attack methods to infiltrate government networks. One web application attack strategy that is becoming more prevalent is credential stuffing, the art of obtaining an individual’s stolen or leaked login credentials and using them to exploit other accounts. Although not overly sophisticated, the damage can have significant impact on government agencies.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms and Conditions apply.

IMPORTANT NOTICE
Any information you supply is subject to our privacy policy. Access to this content is available to registered members at no cost. In order to provide you with this free service, Government Executive Media Group may share member registration information and other information you have provided to us with content sponsors.