Workflow
API exploitation
icon
Search documents
Radware Report Reveals Shifting Attack Vectors in Credential Stuffing Campaigns
Globenewswireยท 2025-07-31 10:00
Core Insights - The report by Radware highlights a significant shift in credential stuffing attacks, moving from volume-based methods to sophisticated, multi-stage infiltration techniques [1][2] Attack Methodologies - 94% of analyzed configurations implement four or more business logic attack elements, with 54% demonstrating advanced orchestration using over 13 distinct techniques [6] - 83% of configurations contain explicit API-targeting techniques [6] - 24% of attack scripts alternate between two device types during execution, with 71% employing cross-platform transitions, primarily between iOS and Windows [6] Target Industries - The primary target sector for these attacks is Technology/SaaS at 27%, followed by financial services/government at 16%, and travel/airline at 13% [6] - High-value AI tools are targeted in 44% of all technology-related attacks, indicating a shift towards exploiting these tools for phishing content [6] - Corporate tools, including Microsoft 365, OneDrive, and Outlook, are also significant targets for ransomware groups seeking initial access to organizational systems [6] Threat Actor Concentration - 51% of the analyzed configurations were created by just three advanced threat actors, indicating a concentration of expertise in the field [6] - Each of these threat actors has over two years of operational experience in specialized areas such as AI platform authentication bypass and mobile API exploitation [6]