Prevent account takeover and credential stuffing
Don’t allow unauthorized access using known compromised credentials
We collect the stolen credentials that have been publicly posted and check them to see if the stolen email and password combination matches the same email and password being used on Facebook.Chris Long, Facebook Security Engineer
Protect The Graph, Oct 2014
ATO is a growing problem
Account takeover (ATO) and credential stuffing attacks are rapidly increasing due to the ease in which customer accounts can by hijacked using credentials breached on other sites
Fraud is expensive
Multiple studies show total fraud incident costs are twice the cost of the fraud itself. And regardless of the size, consumers blame the brand, lose confidence, and often take their business elsewhere.
Proactive prevention for ATO
PasswordPing checks every login to identify and block access using known compromised credentials, an approach previously prohibitive to all but the largest organizations.
Cybercriminals rely on the fact that most people reuse the same login credentials on multiple sites. Block them from using stolen credentials for account takeover attacks and credential stuffing.
PasswordPing Credentials API
How it works
1. At the login page, a visitor enters a username and password.
2. If the credentials are valid, a new process calls the PasswordPing API to determine if the credentials have been compromised.
3. If the credentials have been compromised, the user is informed and prompted to reset their password, blocking all access using compromised credentials.
* Optional: During the password reset, an additional check of PasswordPing can make sure the user selects a password that has never been compromised.