• Our channels:
  • Cyber Risk
  • Chief IT
  • Australian Security
  • Asia Pacific
  • Southeast Asia
  • Space
  • Smart Cities
  • Drones & Robotics
  • Video Systems
  • Podcast
  • MySec.TV
  • Best in Tech
  • MySmartTech
Australian Cyber Security Magazine
Navigate
  • Australian Cyber Security Magazine
  • News
    • Featured
    • Editor’s Desk
    • Skills & Training
    • Governance, Risk & Compliance
    • Hacking & Penetration Testing
    • Information Security
    • Strategy & Architecture
    • MySecurity TV
    • Cyber Security Weekly Podcast
  • Contributors
  • Magazines
  • Events
  • RESOURCES
  • TRAINING
  • SHOP
  • Advertise
  • Subscribe

New Bot Detection Feature by Auth0 Reduces Effectiveness of Credential Stuffing Attacks by Up to 85%

0
By ACSM_admin on August 19, 2020 APP-ACSM, CyberTech Verticals, End-Point Security, Information Security, Vulnerabilities

Auth0 new security feature ‘Bot Detection’ works in tandem with Auth0 Breached Password Detection, Brute Force Protection, and Multi-factor Authentication, to provide mitigation against a variety of threats, including automated attacks, account takeovers, phishing attacks, and more.

Credential stuffing attacks often rely on stolen account credentials (username and password) from a previous data breach, and are used to gain unauthorized access to user accounts on another website. This is executed via large-scale bot-driven attacks against the login flow and is an increasingly pervasive problem for enterprises. Ongoing Auth0 customer analysis revealed the following:

  • Auth0 sees an average of 175,000 unique IP addresses that are deemed suspicious on a daily basis.
  • Threat actors can use as many as 65,000 IP addresses for a single attack.
  • During an attack, credential stuffing can account for as much as 65% of the traffic to Auth0’s authentication service.
  • During a credential stuffing attack, traffic for a particular website may surge as much as 180x the usual volume, with traffic related to the attack itself accounting for 90% of overall activity.

Bot Detection correlates numerous data sources to identify and mitigate bot-driven attacks before login, and relies on a collection of risk signals and assessors that identify indicators of suspicious activity. This layered approach — also known as defense in depth — consists of multiple security capabilities, including Bot Detection, that effectively reduce the number of credential stuffing attempts and many other attacks. At a high level, Bot Detection monitors IP addresses for non-suspicious events, such as successful logins; suspicious events, such as numerous failed login attempts across multiple accounts; and IP reputation data, which is used to identify known threat actors. When suspicious traffic is detected, a CAPTCHA step is required to complete a login request — the system is designed to mitigate the majority of bot attacks targeting the login or registration flow. At launch, Auth0 will support customers using its Universal Login capabilities, with additional support for other experiences in the coming months.

Automated attacks are growing more sophisticated each day, and these large-scale bots are designed to respond to any and all controls to evade detection. Auth0 found that threat actors can, and do, change their attack strategies in as little as five minutes to bypass a security control. More than 80% of companies state it is difficult to detect, fix, or remediate credential stuffing attacks, which result in an average of more than $6 million a year in costs per company and can cause a significant impact on IT resources, account takeovers, and brand reputation.

“We’ve seen an increase in the volume and sophistication of bot attacks over the last few years, and companies are investing more in their defenses,” said Matias Woloski, CTO and cofounder at Auth0. “Being at the front door of applications with a service that secures more than 4.5 billion login transactions per month, we have a unique vantage point for quickly identifying and blocking suspicious activity before any damage is done. This is what makes Bot Detection very effective at preventing account takeover and reducing the load on DevOps and SecOps teams.”

More detailed information on credential stuffing can be found here: Credential Stuffing Attacks: What Are They and How to Combat Them (whitepaper), and Reducing the Impact of Credential Stuffing (blog post).

About Auth0

Auth0 provides a platform to authenticate, authorize, and secure access for applications, devices, and users. Security and application teams rely on Auth0’s simplicity, extensibility, and expertise to make identity work for everyone. Safeguarding more than 4.5 billion login transactions each month, Auth0 secures identities so innovators can innovate, and empowers global enterprises to deliver trusted, superior digital experiences to their customers around the world.

For more information, visit https://auth0.com or follow @auth0 on Twitter.

Share. Twitter Facebook Pinterest LinkedIn Tumblr Email

Related Posts

  • Cyber Security | Featured | Vulnerabilities | May 16, 2025

    SonicWall Confirms Encoded URL Server-Side Request Forgery Vulnerability

  • APP-ACSM | Featured | Technology | May 16, 2025

    Workato Completes Infosec Registered Assessors Program Assessment

  • Cyber Security | Featured | Network Security | Vulnerabilities | White Papers & Research | May 15, 2025

    KnowBe4 Research Reveals Most Phish-Prone Countries

ENJOY OUR OTHER CHANNELS

  • The Australian Cyber Security Magazine covers the broad domain of cybersecurity with news, updates and contributed articles from leading security professionals from
    across the world. The Editorial importantly sets the scene for a challenging threat landscape, with continued reports of serious data breaches.

    MySecurity Media Pty Limited
    ABN 54 145 849 056
    A: GPO Box 930 Sydney NSW 2001
    E: promoteme@mysecuritymedia.com
    W: www.mysecuritymedia.com

  • NETWORK

    • Marketplace
    • Community
    • Contributors
    • Lead Publication
    • Promote Your Brand
    • Privacy Policy
  • NEWS

    • Featured
    • Editor’s Desk
    • Skills & Training
    • Governance, Risk & Compliance
    • Hacking & Penetration Testing
    • Information Security
    • Strategy & Architecture
  • DOWNLOAD APP

  • EVENTS
    > Find a Speaker
    > New Arrivals
    > Upcoming Events
    > Past Events
    > Register an Event
  • RESOURCES
    > Reports
    > Whitepapers
    > Research
    > Books
    > COVID 19 Resources
    > Magazines
    > Podcasts
    > MySecurity TV
    > Australia in Space TV
  • PRODUCTS
    > Solution Products
    > Online Store
    > TeePublic Store
    > Promote Your Brand

    TRAINING
    > Courses
    > Webinars – Live
    > Webinars – On Demand
    > Learn Security Platform
  • COMMUNITY
    > Indo-Pacific Space and Earth Network
    > Space and Earth - Partners and Advisory
    > IPRAAC
    > IPSEC
    > Security & Risk Professional Insight Series
    > Women in Security Awards
    > Partners
    > Speakers
    > Providers
    > Promote Your Brand
  • NEWS CHANNELS
    > MySec.TV
    > Australia in Space TV
    > Cyber Security Weekly Podcast
    > Cyber Risk Leaders
    > Chief IT
    > Drones & Robotics
    > Space & Defense
    > Australia in Space
    > Smart Cities Tech
    > Video Systems
    > Asia Pacific Security Magazine
    > ASEAN Technology & Security
    > Australian Cyber Security Magazine
    > Australian Security Magazine

© My Security Media. All Right Reserved 2019.   Privacy Policy | Terms & Conditions | Competition T&Cs