Automatic Hacking Machine Uses Millions Of Stolen Passwords To Attack

Forbes - Mar 25th, 2025
Open on Forbes

A new automated hacking machine, Atlantis AIO, has emerged as a significant threat in the cybersecurity landscape. According to a report by Abnormal Security, this tool utilizes millions of stolen passwords to execute credential stuffing attacks on over 140 different platforms, including email services, VPNs, streaming, and food delivery accounts. Atlantis AIO's modular design allows cybercriminals to efficiently target specific services with pre-configured modules, making it easier to conduct large-scale attacks with minimal effort.

The implications of Atlantis AIO are profound, as it highlights the evolving sophistication of cyber threats. The tool's ability to bypass two-factor authentication using session cookies and its specialized modules for brute-force attacks and account recovery underscore the need for robust cybersecurity measures. Users are advised to employ unique and strong passwords, utilize password managers, and enable two-factor authentication to mitigate such threats. This development serves as a stark reminder of the importance of cybersecurity vigilance in an increasingly interconnected digital world.

Story submitted by Fairstory

RATING

6.0
Moderately Fair
Read with skepticism

The article provides a timely and relevant discussion on the threats posed by credential stuffing and automated hacking tools like Atlantis AIO. It effectively raises awareness about the risks associated with compromised passwords and the need for robust cybersecurity measures. However, the article could benefit from greater source variety and transparency in its claims to enhance credibility. While the article is clear and accessible, providing more background on technical terms would improve reader comprehension. Including diverse perspectives and expert opinions could also enrich the discussion and increase reader engagement. Overall, the article serves as a useful introduction to the topic but could be strengthened with additional verification and depth.

RATING DETAILS

7
Accuracy

The article presents several factual claims that are mostly consistent with known information about cyber threats, particularly credential stuffing and the use of stolen credentials. However, the existence and specific capabilities of the 'Atlantis AIO' as an automatic hacking machine using millions of stolen passwords require further verification. The claim about billions of compromised passwords aligns with general cybersecurity reports, but the specific figure of 85 million passwords currently in use should be verified with credible sources. The mention of session cookies being used to bypass two-factor authentication (2FA) is plausible, but needs more detailed evidence or expert validation to support its accuracy.

6
Balance

The article primarily focuses on the threat posed by the Atlantis AIO tool and the broader issue of credential stuffing. While it effectively highlights the dangers to individual and corporate security, it lacks a balanced perspective by not including viewpoints from cybersecurity experts or organizations that might offer countermeasures or differing opinions on the severity of the threat. Additionally, the article could benefit from including information on how businesses and individuals are successfully mitigating these risks, which would provide a more rounded view of the issue.

8
Clarity

The article is generally clear and well-structured, making it easy to follow the main points and understand the potential threats posed by credential stuffing and tools like Atlantis AIO. The language is straightforward, and the use of specific examples, such as the targeting of email providers and streaming services, helps illustrate the article's claims. However, the article could improve clarity by providing more background information on technical terms like 'credential stuffing' and 'session cookies' for readers who may not be familiar with cybersecurity concepts.

5
Source quality

The article references a report from Abnormal Security, which suggests some level of source credibility. However, it lacks direct quotes or detailed information from the report itself, making it difficult to assess the reliability of the claims. The absence of additional sources, such as cybersecurity experts or other industry reports, reduces the overall source quality. Including a variety of authoritative sources would enhance the article's credibility and provide a more comprehensive understanding of the topic.

4
Transparency

The article does not clearly disclose the methodology behind its claims, particularly regarding the number of compromised passwords and the capabilities of Atlantis AIO. There is a lack of transparency in how the information was obtained and the potential conflicts of interest that may exist. The article would benefit from a clearer explanation of the basis for its claims and any limitations or uncertainties associated with the data presented.

Sources

  1. https://pages.sift.com/rs/526-PCC-974/images/Sift-Fraud-prevention-in-ecommerce-report-2023-2024.pdf?version=0
  2. https://www.celebrus.com/blogs/ho-to-win-the-fight-against-ato-fraud
  3. https://proxyman.com
  4. https://www.insidehighered.com/opinion/blogs/online-trending-now/2024/08/29/upskill-reskill-or-retire-responding-advent-ai
  5. https://iranprimer.usip.org/resource/timeline-us-sanctions