In recent times, you might have noticed user accounts being compromised by the millions, and yet companies refute these claims saying that their systems are secure and have not been attacked. In these cases, the companies are right – instead of a direct attack, the hackers may have performed an attack called ‘credential stuffing’. In this type of attack, hackers get their hands on usernames and passwords of one application or service and stuff the same credentials on another login for another digital provider.

For example, if you have used the same user ID and password for creating your Facebook and Twitter accounts, a hacker who has access to your Facebook user id and password can use the same for getting into your Twitter account. This does not mean that Twitter’s systems are faulty. It simply means that your credentials have been stuffed. Credential stuffing attacks use code injection techniques to test the credentials against multiple accounts like social media, online marketplaces, and bank accounts. Once access is gained, the hacker can get access to personal information, credit card information and other personally verifiable information.

In recent times, this type of attack has gained popularity due to the fact that most users use the same user ID and password for multiple accounts. The situation right now is precarious for most online users – a recent breach of breaches has given hackers access to a whopping 2.2 billion user IDs and passwords. It is called a ‘breach of breaches’ because a few hackers hacked into millions of Dropbox and LinkedIn accounts and compiled a list of plain text credentials. However, another team of hackers hacked into this list to compile an even bigger list of stolen credentials.

If you have built enterprise applications, how sure can you be that your users have created different passwords for all your applications? There is no way for you to know for sure. However, you could put in place a password policy which prevents them from using the same password for all the applications in your network.

Akku from CloudNow Technologies allows you to set custom password policies to help you standardize the passwords set by your users. You can also leverage it to prevent the setting of the same passwords. To know more, get in touch with us now.

Ananthasayanam Nallan Chakravarthy

Ananthasayanam is Executive Vice President – Global Sales at Akku, where he leads the company’s global go-to-market strategy, driving revenue growth and building long-term client relationships across industries. His focus is on expanding Akku into new markets, while strengthening strategic alliances and cultivating high-performance teams. Prior to joining Akku, he held senior leadership roles at Denodo, Oracle, Tectura, Ramco Systems, and other organizations, gaining extensive experience in sales management, business development, and enterprise technology across global markets.

Recent Posts

Still don’t have PAM in 2026? Here are 10 reasons you need it today!

In today's high-stakes cybersecurity environment, privileged accounts control access to your most critical systems and sensitive data. Poor management or…

2 days ago

Frictionless customer onboarding with Customer Identity & Access Management (CIAM)

As an organization with hundreds or even thousands of customers, streamlined management of their identities and access privileges across your…

2 weeks ago

How Mobile Device Management is Powering the Future of Remote Work

When businesses move to remote operations, teams tend to prioritize fast internet and collaboration tools. However, problems arise when sensitive…

3 months ago

How to Implement Privileged Access Management (PAM) in Cloud and Hybrid Environments

Privileged accounts are an under-recognized center of risk in modern IT. The move to cloud and hybrid environments multiplies the…

4 months ago

Group Policy Object (GPO) Management, and How Akku GPO Manager Simplifies It

How do enterprises keep thousands of users and devices aligned with the same security and compliance standards? The answer often…

5 months ago

IAM Using SSO and Federated Identity Management

Have you ever wondered how large organizations let employees access multiple applications securely without juggling dozens of passwords? The answer…

5 months ago