Skip Navigation

March 27, 2025 |

140 online platforms targeted by new Atlantis credential stuffer

Loading table of contents...

Cybersecurity researchers are tracking the emergence of a new cybercrime platform called 'Atlantis AIO' that offers automated credential stuffing services targeting 140 online platforms, including email providers, e-commerce sites, banks, VPNs, streaming platforms, and food delivery services. This tool comes with pre-configured modules that facilitate brute-force attacks, CAPTCHA bypassing, automated account recovery, and monetization of compromised accounts.

Credential stuffing is an attack vector in which the threat actor uses stolen or leaked username-password pairs to gain unauthorized access to user accounts across various services. The technique takes advantage of users relying on the same password for different accounts.

If a threat actor obtains a username and password for one online service, they ‘stuff’ the same combination into other online services to see if it works. If it does, and the account lacks multi-factor authentication (MFA), threat actors can hijack and exploit these accounts or sell access to them to others.

ThreatRoundUp_SignUp_Simplifiedx2

Stay on top of emerging threats.

Sign up to receive a weekly roundup of our security intelligence feed. You'll be the first to know of emerging attack vectors, threats, and vulnerabilities. 

Sign up

Credential stuffing is often carried out by an automated process as it can take thousands of attempts to get one successful compromise.

Until now, cybercriminals have relied on free tools like Open Bullet 2 and SilverBullet, along with shared configurations, to conduct credential stuffing attacks. The introduction of Atlantis AIO represents a significant advancement in the automation and efficiency of these malicious activities, posing increased risks to online security.

Source: Bleeping Computer

Analysis

The emergence of Atlantis AIO is significant due to its potential to amplify the scale and effectiveness of credential stuffing attacks. A surge in credential stuffing attacks would lead to increased account takeovers, financial losses, and data breaches across various online platforms.

Threat actors have several options once they successfully gain access to an account. They can:

  • Use it for their own purposes: Attackers may exploit accounts directly, such as withdrawing funds from financial accounts, stealing sensitive information, or making fraudulent transactions.
  • Sell it on dark web marketplaces: Many cybercriminals specialize in account trading and selling access to compromised accounts for others to exploit. High-value accounts (banking, email, and streaming services) can fetch higher prices.
  • Leverage it for further attacks: Attackers might use compromised accounts to launch phishing campaigns, commit identity theft, or gain deeper access into an organization’s network.

Credential stuffing remains a major threat because it exploits human tendencies, in this case password reuse, while being relatively easy to automate. The emergence of Atlantis AIO highlights the need for organizations and individuals to implement robust security measures, such as MFA and the use of unique, complex passwords, to mitigate the risks associated with credential stuffing.

Mitigation

Field Effect’s Security Intelligence team constantly monitors the cyber threat landscape for threats related to the unauthorized access of user accounts. Field Effect MDR users are automatically notified when suspicious activity related to their accounts is detected and are encouraged to review these AROs as quickly as possible via the Field Effect Portal.

Field Effect recommends that both organizations and individuals implement MFA to add an extra layer of protection, making it harder for attackers to gain access even if they have valid credentials.

Organizations should monitor for unusual login activity, such as multiple failed attempts or logins from unfamiliar locations, to help detect potential attacks early. Most importantly, organizations should avoid password reuse and deploy a dark web monitoring service, like the one included in Field Effect MDR Complete, to identify leaked credentials.

Related Articles