Akamai Research Highlights SVOD Security Risk

The State of the Internet / Security: Credential Stuffing: Attacks and Economies – Special Media Report, explains how criminals are enabling non-subscribers to view content via pirated streaming accounts.

Akamai's report found that three of the largest credential stuffing attacks against streaming services in 2018, ranging in size from 133 million to 200 million attempts, took place shortly after reported data breaches, indicating hackers were likely testing stolen credentials before selling them. The research found that the U.S. is the top country of origin for the attacks, followed by Russia and Canada. The U.S. is also the most targeted country for credential stuffing attacks, followed by India and Canada.

In a credential stuffing attack, nefarious actors tap automated tools to use stolen login information to attempt to gain access to user accounts on other online sites, on the assumption that consumers use the same login and password for multiple services.

Stolen credentials can be used for a host of illicit purposes, not the least of which is enabling non-subscribers to view content via pirated streaming accounts. Compromised accounts are also sold, traded or harvested for various types of personal information, and they are often available for purchase in bulk on the Dark Web, according to Akamai researchers.

“Educating subscribers on the importance of using unique username and password combinations is one of the most effective measures businesses can take to mitigate credential abuse,” said Akamai global director Patrick Sullivan. “The good news is that organizations are taking the threat seriously and investigating security defenses, as evidenced by the discussions at NAB. Akamai offers its research and best practices to help these organizations who are facing significant brand and financial harm.”

Let us know what you think…

Log-in or Register for free to post comments…

You might also like...

Building On IP COTS

Transitioning to IP improves flexibility and scalability, both of which are achievable using COTS IT equipment. But can COTS solve every challenge? Or does broadcasting still have some unique and more demanding requirements that need further attention? In this article,…

The Move Towards Next Generation Platforms

Whenever I’m asked about my opinion on the transition to IP, I always state that the impact can’t be appreciated until its history is understood. This brings into context the need for broadcasters to educate and surround themselves wit…

Taming The Virtualized Beast

Without doubt, virtualization is a key technological evolution focus and it will empower many broadcast and media organizations to work differently, more efficiently and more profitably.

Color and Colorimetry – Part 3

The human visual system (HVS) sees color using a set of three overlapping filters, which are extremely broad. As a result, the HVS is completely incapable of performing any precise assessment of an observed spectrum.

Color and Colorimetry – Part 2

At one time the only repeatable source of light on Earth was the sun. Later it was found that if bodies were made hot enough, they would radiate light. Any treatment of illumination has to start with the radiation from…