DailyMotion is a popular video sharing platform that is used by millions of users. Recently, DailyMotion confirmed that it was the victim of a credential stuffing attack.
So here’s everything you need to know about the credential stuffing attack on DailyMotion.
DailyMotion Confirms Credential Stuffing Attack
Credential Stuffing is a type of cyber attack that helps hackers to gain illegal access over your accounts on different websites. Hackers rely on the different combinations of usernames and passwords that are leaked from major security and data breaches.
DailyMotion has sent out emails to affected users informing them about the credential stuffing attack. The video sharing platform has also stated that the security team discovered the credential stuffing attack and took the necessary steps to completely block it.
Dailymotion quickly logged out affected users and started the password reset procedure. The email sent out to affected users also included a link that helped users to regain access to their accounts. Furthermore, Dailymotion has also informed CNIL (Commission nationale de l’informatique et des libertés), about the attack in accordance with Europe’s GDPR laws.
Lastly, it’s worth noting that only a limited number of accounts were affected by the credential Stuffing Attack. Consequently, if you didn’t receive any email from DailyMotion your account is completely safe and secure.
How To Safeguard Your Online Accounts
Data breaches and credential stuffing attacks are nothing new. These attacks affect many users on different websites and social media platforms that securely store our personal data. In fact, around two weeks ago Reddit announced that hackers gained illegal access to some accounts by relying on a credential stuffing attack.
Using different passwords for different websites and social media platforms can definitely help you to safeguard your account against credential stuffing attacks. Furthermore, if the service allows you can 2FA and provide an extra layer of protection against data breaches.