
The tool was later modified by “Astaris” according to Sentry MBA’s opening interface.

The first iteration of this custom Windows brute-forcing application, “Sentry 2.0”, was originally developed by someone using the alias “Sentinel” in underground communities. If you work in INFOSEC, you may already be familiar with the credential stuffing tool known as Sentry MBA (named Sentry 2.0 MBA version by the original developer). So what about these tools? What are they and what exactly do they do? 1. The attacker uses automated credential stuffing tools, sometimes via botnets, to test the stolen credentials against many other sites (to name a few: social media sites, retail organizations, loyalty programs). Some underground websites even advertise the expected success rates of their credential lists.ģ. A threat actor acquires leaked username and credentials directly from the breach or from purchasing/trading in the underground. The breached data is then posted to public paste sites, sold in bulk on underground marketplaces, and/or traded and advertised in underground forums.Ģ. A 3 rd party breach occurs, credentials are leaked, or site is compromised in some way. This may sound like a relatively insignificant proportion, but it equivocates to billions of dollars worldwide in automated fraud losses.Ĭredential stuffing attacks typically follow some form of the following timeline:ġ. On average, attackers are seeing up to a 2% success rate for gaining access to these accounts simply due to password reuse. These tools make the process so easy, anyone can do it. Custom tools that have been circulating the underground “cracking” scene in recent years automate this process. The proliferation of stolen or leaked databases has resulted in a recent surge in automated credential stuffing. Criminals load lists of breached credentials into these tools to test them at large scale against targeted web or mobile authentication interfaces. Credential stuffing is the act of testing large sets of stolen credentials against a targeted interface. Custom-built “cracking” tools are making it easier than ever for criminals to automate credential stuffing.
