BRIEF

Automating Cybercrime with Sentry MBA

Sentry MBA

Anatomy of a Sentry MBA attack:

  • Targeting and attack refinement.
  • Automated account checking.
  • Monetization. Sentry MBA (and the criminal ecosystem that supports it) dramatically improve criminal productivity during the first two phases.

screenshot of Sentry MBA

Using Sentry MBA in Credential Stuffing Attacks

A list of usernames and passwords is at the heart of every Sentry MBA attack. In Sentry MBA parlance, these are called “combo” lists. If the combo list has credentials that were valid on another website (e.g. via publicized breaches at eBay, Sony, and Ashley Madison or through phishing techniques), the attack is called “credential stuffing.” Credential stuffing works because Internet users routinely reuse passwords across web accounts. Verizon’s 2015 data breach report cites the use of stolen credentials as the most common attack action used against web applications today.

Read 2021 F5 Labs Credential Stuffing report ›

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us