Credential Stuffing Attack on a Website

Credential Stuffing Attack on a Website

Profile picture for user LukasVileikis
Lukas Vileikis
13 July 2021

If you have found yourself in the security at least for a little while, you have probably heard of credential stuffing attacks. Attacks, as sad as it might sound, are rampant - especially these days, where data breaches happen left and right. In this blog post, we are going to explain what credential stuffing attacks are and how they might harm your business.

What is Credential Stuffing?

In its simplest form, credential stuffing refers to unauthorized access to systems using large-scale automatic login requests. Credential stuffing is a problem that doesn’t seem to go away - as data breaches happen, credential stuffing enables the attackers to get unauthorized access to information systems and after they have gained access, the cycle can repeat itself because more and more data is getting stolen that way.

How to Protect Against Credential Stuffing?

To protect against credential stuffing, consider employing a multi-factor authentication to protect your online accounts. Multi-factor authentication is an effective way to protect against identity theft and mitigate credential stuffing and other types of attacks (for example, bruteforcing or password spraying) because it provides an additional layer of protection should an attacker with malicious intent try to access your online accounts.

Security with Backup Ninja

Backup Ninja ensures security in a few ways:

  • Backups can be encrypted or decrypted (also compressed)
  • Data security is ensured through file permissions and also data communications.

As far as backup encryption is concerned, when encrypting a backup, Backup Ninja uses AES256 OFB encryption mode. Information security is ensured because /etc/bartender.yaml, /var/lib/backup-agent/ and /var/log/bartender.log must be owned by the root user and must not be readable by other users in the system, also because Backup Ninja only initiates one-way traffic to it through the bartender agent, but not vice versa.

For example, to observe the security status of your backups, click Backups, then click View on the backup you want to dive into:

Backup Schedule

You will be able to observe its type, method, compression and encryption status, backup name template, what server it’s created on and what it’s schedule, also its last execution date. If you want, you can run (or pause) the backup, edit or duplicate it. Backups can also be observed (and scheduled) on the Schedules tab:


When scheduling a backup, you will be able to set a name for the schedule, select what server you want to perform the backup on, select the backup method and backup type (Full or Partial), enable or disable Point in Time Recovery or backup a database per file:

Schedule Details

Backups can also be uploaded to the cloud if you so desire once you select one of many of the cloud providers that are available:

Cloud Providers


Credential stuffing attacks, even though they are unfortunate, are an unavoidable reality in today’s world. In order to protect against such attacks, make sure to use multifactor authentication and if you’re protecting your backups, consider encrypting them and storing them in the cloud.