Home / Royal Mail / Roku Detects 600,000 Impacted in Credential Stuffing Attacks

Roku Detects 600,000 Impacted in Credential Stuffing Attacks

Unauthorised actors accessed about 600,000 user accounts using credential stuffing attacks.

Streaming service Roku has reported that unauthorised actors accessed about 600,000 user accounts using credential stuffing attacks.

Using stolen usernames and passwords from one platform, and attempting to log in to accounts on other platforms, two incidents were identified – one impacting around 15,000 user accounts, and another of 576,000.

Roku concluded that there was no data security compromise within its systems, that Roku was not the source of the account credentials used in these attacks, and in fewer than 400 cases, malicious actors logged in and made unauthorised purchases of streaming service subscriptions and Roku hardware products using the payment method stored in these accounts.

However Roku’s monitoring determined that attackers did not gain access to any sensitive information, including full credit card numbers or other full payment information.

Roku said it has more than 80M active accounts, so those impacted “represents a small fraction” of its user base.

“We sincerely regret that these incidents occurred and any disruption they may have caused,” its statement read. “Your account security is a top priority, and we are committed to protecting your Roku account.” 


Written by

Dan Raywood
Senior Editor
SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.


Source link

About admin

Check Also

'Elon Musk of Essex' prepares to call in administrators – The Telegraph

It signed agreements in principle with the likes of Royal Mail and Travis Perkins to …

Leave a Reply

Your email address will not be published. Required fields are marked *