
Blogs & Opinions 10.07.2025
CISO ‘How to’ Without the Bull: Credential Stuffing Response
When credential stuffing attacks hit the retail sector, user friction gets pitted against fraud protection.
Blogs & Opinions 10.07.2025
When credential stuffing attacks hit the retail sector, user friction gets pitted against fraud protection.
In light of a few online retailers (including North Face) suffering customer account compromise cyber attacks and the news of the 23&Me fine after a similar event, I’ve analysed the type of attack deeper.
It appears that North Face suffered a data breach via a credential stuffing attack (the mass use of previously breached usernames and passwords against a website), originally notifying the authorities on 4 April 25 after first discovery on March 13, 2025. North Face has experienced this type of attack before, having suffered credential stuffing attacks in November 2020 and September 2022, followed by a ransomware attack in December 2023.
From experience, I know that incidents like these inevitably lead to a conversation about balancing the amount of friction a business is prepared to add to a customer’s purchase journey (risking abandoned shopping baskets) in order to enhance security and prevent fraud.
Let’s explore credential stuffing attacks and, perhaps more importantly, how to best defend against the subsequent losses.
Think of a credential stuffing attack as an ecosystem which can be boiled down to the use of historic usernames and passwords stolen from a different third party and reused to successfully gain unauthorised access to an account. For this blog, I’m focussing on retail and therefore customer accounts.
If left unchecked, this type of attack leads to either the fraudulent purchase of items (including easily sold-on goods, such as gift cards and vouchers) with credit cards or vouchers stored in the account or stolen elsewhere. For high-value, easy-to-sell goods, this can be very attractive to criminals.
“Incidents like these inevitably lead to a conversation about balancing the amount of friction a business is prepared to add to a customer’s purchase journey in order to enhance security and prevent fraud”
Retailers often overlook the second issue with these attacks: unauthorised access and exfiltration of personal details. This may be a shipping address, purchase history or even details such as date of birth, all of which can be used in social engineering attacks and identity theft. A third-party accessing customer accounts and the personal data held within equates to a data breach. Therefore, the retailer needs to confidently know who is impacted and by what degree of harm. Only then can they inform the impacted data subjects and then notify the ICO of exactly which personal details were accessed.
But don’t fear, all is not lost, as I will share methods to address this.
Cyber teams are great at staff account protection. They’ll have MFA, conditional access policies, logs and alerts. Sometimes, however, customer accounts don’t get the same level of attention and security. This is a mistake. There is a great opportunity to show genuine financial value by using the resources at hand.
In my experience, store fraud (shop lifting, fake returns, etc.) is well understood by the business, but online fraud can be a grey area, particularly as multi-channel retailers have multi-channel fraud. I firmly believe that cyber can own the customer account compromise protection. As the cyber team likely has the best logs, the best insight and some great analytical brains, they can show real business value by owning the entire chain of anti-fraud protections. Let me introduce a valuable three-way strategy:
The controls to address credential stuffing require three internal parties:
This working triad addresses the security, customer and effort required. A group of empowered individuals from each of the three parties can make a real difference, representing their areas and the interests of those they represent. It’s also a perfect forum to share upcoming sales promotions or loyalty card point cash-ins, as knowing this can really help tailor the controls in advance.
The options for addressing the credential stuffing problem are shared below, as I walk through the cred stuffing ecosystem. Note, as always, a lot of the steps require a considered trade-off between customer friction and fraud prevention.
Stage | Defensive options |
1. Party A hacks a third-party website and usernames/passwords are stolen. Often these passwords are hashed and need decrypting. Sometimes, these are already in clear text. |
|
2. Party A sells this long list of data to Party B on a market place, typically the dark web. |
|
3. Party B uses a bot to attempt to automate logging into a website with every username/password. Because people re-use passwords, a percentage of these will be successful. Party B sells this shortlist for a higher value, making a profit. |
|
4. Party C buys the confirmed successful logins from Party B and either users stored credit cards, subscriptions, or stolen credit cards to purchase items to a different delivery address |
|
5. Party C sells fraudulently purchased goods for a profit. This might also entail returning the items for a refund, sometimes to multiple stores or shipping the returned item box with a weight of no value |
|
The 23&Me strategy to place some of the blame on the customers may well have contributed to their fine, which I agree with. Public relations is paramount. Here are some tips:
Sending the internal message of the value the cyber team is offering reinforces the investment and effort. If played well, the savings or value of loss prevention can be argued for offsetting parts of the security budget. The art is using language that the business understands. For example: