Radware's report outlines evolving credential stuffing attack techniques, highlighting advanced infiltration methods and the need for enhanced security strategies.
Quiver AI Summary
Radware, a leader in application security, has released a new research report titled "The Invisible Breach: Business Logic Manipulation and API Exploitation in Credential Stuffing Attacks," which highlights a significant transformation in credential stuffing attacks. The report indicates a shift towards sophisticated, multi-stage infiltration techniques, moving away from simple password attempts to tactics that manipulate business logic, exploit APIs, and spoof devices. It reveals that 94% of analyzed attack configurations incorporate multiple business logic techniques, while 83% target APIs, and that technologies such as AI tools and corporate platforms like Microsoft 365 are prime targets for these attacks. Radware's findings emphasize the need for organizations to adopt comprehensive security strategies that monitor user behavior and detect irregular patterns, rather than relying solely on traditional credential-based defenses.
Potential Positives
- Radware has released a new research report that highlights a significant evolution in credential stuffing attacks, showcasing the company's expertise in recognizing and addressing emerging cybersecurity threats.
- The report reveals advanced attack methodologies, such as business logic manipulation and API exploitation, indicating that Radware is at the forefront of understanding sophisticated cyber threats.
- By analyzing 100 advanced credential stuffing configurations, the report positions Radware as a thought leader in cybersecurity research, which can enhance its reputation and credibility in the industry.
Potential Negatives
- The release highlights increasing sophistication in credential stuffing attacks, which may raise concerns about the effectiveness of Radware's current security solutions in combating these evolving threats.
- The report identifies specific vulnerabilities related to high-value AI tools and corporate applications, potentially indicating that Radware's solutions may not adequately protect its clients' most critical assets.
- The press release includes extensive disclaimers about the risks associated with forward-looking statements, which could lead to uncertainty among investors regarding the company's future performance and strategic direction.
FAQ
What is the main focus of Radware's new report?
The report highlights advanced techniques in credential stuffing attacks, emphasizing business logic manipulation and API exploitation.
How has credential stuffing evolved according to Radware?
Credential stuffing has shifted from volume-based attacks to sophisticated multi-stage infiltration techniques that bypass traditional defenses.
What sectors are most targeted by these advanced attacks?
Technology/SaaS, financial services/government, and travel/airline industries are primarily targeted, with Technology/SaaS being the highest at 27%.
What strategies should organizations adopt to defend against these attacks?
Organizations must implement security strategies that validate entire user journeys and detect suspicious behaviors instead of relying solely on credential-centric controls.
Where can I access Radware's complete research report?
Radware's complete report can be downloaded from their official website under the report section.
Disclaimer: This is an AI-generated summary of a press release distributed by GlobeNewswire. The model used to summarize this release may make mistakes. See the full release here.
$RDWR Hedge Fund Activity
We have seen 47 institutional investors add shares of $RDWR stock to their portfolio, and 73 decrease their positions in their most recent quarter.
Here are some of the largest recent moves:
- PHOENIX FINANCIAL LTD. removed 436,668 shares (-79.9%) from their portfolio in Q2 2025, for an estimated $12,855,505
- MILLENNIUM MANAGEMENT LLC removed 234,791 shares (-38.3%) from their portfolio in Q1 2025, for an estimated $5,076,181
- FIRST TRUST ADVISORS LP added 229,985 shares (+26.1%) to their portfolio in Q1 2025, for an estimated $4,972,275
- MORGAN STANLEY added 193,797 shares (+7.8%) to their portfolio in Q1 2025, for an estimated $4,189,891
- BANK OF AMERICA CORP /DE/ added 177,989 shares (+15807.2%) to their portfolio in Q1 2025, for an estimated $3,848,122
- LEGAL & GENERAL GROUP PLC added 150,556 shares (+6.7%) to their portfolio in Q1 2025, for an estimated $3,255,020
- BLACKROCK, INC. added 143,476 shares (+10.2%) to their portfolio in Q1 2025, for an estimated $3,101,951
To track hedge funds' stock portfolios, check out Quiver Quantitative's institutional holdings dashboard.
Full Release
MAHWAH, N.J., July 31, 2025 (GLOBE NEWSWIRE) -- Radware ® (NASDAQ: RDWR), a global leader in application security and delivery solutions for multi-cloud environments, today released a new research report — The Invisible Breach: Business Logic Manipulation and API Exploitation in Credential Stuffing Attacks . The report reveals a paradigm shift in credential stuffing attacks. It underscores a fundamental transformation from volume-based attacks leveraging a series of repeated password attempts to sophisticated, multi-stage infiltration techniques.
“To bypass traditional defenses, modern credential stuffing attacks are shifting away from traditional password-spraying techniques in favor of business logic manipulation, cross-platform device spoofing, and strategic API exploitation,” said Arik Atar, senior cyber threat intelligence researcher at Radware. “The message for defending organizations is clear. To match this new reality, they must move beyond credential-centric controls to adopt security strategies that validate entire user journeys, correlate cross-request behavior, and detect suspicious patterns in business logic flows.”
Radware’s research examined 100 advanced credential stuffing configurations deployed through a well-known account takeover tool called SilverBullet.
Advanced attack methodologies
- Business logic attacks: 94% of configurations implement four or more business logic attack elements, with 54% demonstrating advanced orchestration, using 13+ distinct techniques.
- API exploitation: 83% of configurations contain explicit API-targeting techniques.
-
Multi-device spoofing: 24% of attack scripts alternate between two device types during execution, with 71% employing cross-platform transitions, primarily between iOS and Windows.
Primary targets
- Industries: Technology/SaaS emerged as the primary target sector (27%), followed by financial services/government (16%), and the travel/airline (13%) sectors.
- Online tools: There is a significant shift toward high-value AI tools (44% of all technology targets), potentially exploited by spammers who engage in account cracking to create large-scale phishing content. In addition, corporate tools (30%), including Microsoft 365, OneDrive, and Outlook, are likely targets for ransomware groups pursuing initial access to organizational systems.
Centralized threat landscape
- Concentration: 51% of the analyzed configurations, randomly collected over six months, were written by just three advanced threat actors: SVBCONFIGSMAKER, t.me/mrcombo1services, and @Magic_Ckg.
- Specialization: Each threat actor had over two years of operational experience in distinct areas of specialization, including AI platform authentication bypass, mobile API exploitation, and Microsoft cloud services.
Radware’s complete report— The Invisible Breach: Business Logic Manipulation and API Exploitation in Credential Stuffing Attacks —can be downloaded here .
The research methodology was based on an analysis of 100 SilverBullet credential stuffing attack scripts to identify emerging trends, techniques, and tactics in modern account takeover (ATO) campaigns. The scripts were collected from Telegram channels of threat actors and published between December 2024 and May 2025.
About Radware
Radware
® (NASDAQ: RDWR) is a global leader in application security and delivery solutions for multi-cloud environments. The company’s cloud application, infrastructure, and API security solutions use AI-driven algorithms for precise, hands-free, real-time protection from the most sophisticated web, application, and DDoS attacks, API abuse, and bad bots. Enterprises and carriers worldwide rely on Radware’s solutions to address evolving cybersecurity challenges and protect their brands and business operations while reducing costs. For more information, please visit the
Radware
website.
Radware encourages you to join our community and follow us on:
Facebook
,
LinkedIn
,
Radware Blog
,
X
, and
YouTube
.
©2025 Radware Ltd. All rights reserved. Any Radware products and solutions mentioned in this press release are protected by trademarks, patents, and pending patent applications of Radware in the U.S. and other countries. For more details, please see: https://www.radware.com/LegalNotice/ . All other trademarks and names are property of their respective owners.
THIS PRESS RELEASE AND RADWARE’S THE INVISIBLE BREACH: BUSINESS LOGIC MANIPULATION AND API EXPLOITATION IN CREDENTIAL STUFFING ATTACKS REPORT ARE PROVIDED FOR INFORMATIONAL PURPOSES ONLY. THESE MATERIALS ARE NOT INTENDED TO BE AN INDICATOR OF RADWARE'S BUSINESS PERFORMANCE OR OPERATING RESULTS FOR ANY PRIOR, CURRENT, OR FUTURE PERIOD.
Radware believes the information in this document is accurate in all material respects as of its publication date. However, the information is provided without any express, statutory, or implied warranties and is subject to change without notice.
The contents of any website or hyperlinks mentioned in this press release are for informational purposes and the contents thereof are not part of this press release.
Safe Harbor Statement
This press release includes “forward-looking statements” within the meaning of the Private Securities Litigation Reform Act of 1995. Any statements made herein that are not statements of historical fact, including statements about Radware’s plans, outlook, beliefs, or opinions, are forward-looking statements. Generally, forward-looking statements may be identified by words such as “believes,” “expects,” “anticipates,” “intends,” “estimates,” “plans,” and similar expressions or future or conditional verbs such as “will,” “should,” “would,” “may,” and “could.” For example, when we say in this press release that to match this new reality, organizations must move beyond credential-centric controls to adopt security strategies that validate entire user journeys, correlate cross-request behavior, and detect suspicious patterns in business logic flows, we are using forward-looking statements. Because such statements deal with future events, they are subject to various risks and uncertainties, and actual results, expressed or implied by such forward-looking statements, could differ materially from Radware’s current forecasts and estimates. Factors that could cause or contribute to such differences include, but are not limited to: the impact of global economic conditions, including as a result of the state of war declared in Israel in October 2023 and instability in the Middle East, the war in Ukraine, tensions between China and Taiwan, financial and credit market fluctuations (including elevated interest rates), impacts from tariffs or other trade restrictions, inflation, and the potential for regional or global recessions; our dependence on independent distributors to sell our products; our ability to manage our anticipated growth effectively; our business may be affected by sanctions, export controls, and similar measures, targeting Russia and other countries and territories, as well as other responses to Russia’s military conflict in Ukraine, including indefinite suspension of operations in Russia and dealings with Russian entities by many multi-national businesses across a variety of industries; the ability of vendors to provide our hardware platforms and components for the manufacture of our products; our ability to attract, train, and retain highly qualified personnel; intense competition in the market for cybersecurity and application delivery solutions and in our industry in general, and changes in the competitive landscape; our ability to develop new solutions and enhance existing solutions; the impact to our reputation and business in the event of real or perceived shortcomings, defects, or vulnerabilities in our solutions, if our end-users experience security breaches, or if our information technology systems and data, or those of our service providers and other contractors, are compromised by cyber-attackers or other malicious actors or by a critical system failure; our use of AI technologies that present regulatory, litigation, and reputational risks; risks related to the fact that our products must interoperate with operating systems, software applications and hardware that are developed by others; outages, interruptions, or delays in hosting services; the risks associated with our global operations, such as difficulties and costs of staffing and managing foreign operations, compliance costs arising from host country laws or regulations, partial or total expropriation, export duties and quotas, local tax exposure, economic or political instability, including as a result of insurrection, war, natural disasters, and major environmental, climate, or public health concerns; our net losses in the past and the possibility that we may incur losses in the future; a slowdown in the growth of the cybersecurity and application delivery solutions market or in the development of the market for our cloud-based solutions; long sales cycles for our solutions; risks and uncertainties relating to acquisitions or other investments; risks associated with doing business in countries with a history of corruption or with foreign governments; changes in foreign currency exchange rates; risks associated with undetected defects or errors in our products; our ability to protect our proprietary technology; intellectual property infringement claims made by third parties; laws, regulations, and industry standards affecting our business; compliance with open source and third-party licenses; complications with the design or implementation of our new enterprise resource planning (“ERP”) system; our reliance on information technology systems; our ESG disclosures and initiatives; and other factors and risks over which we may have little or no control. This list is intended to identify only certain of the principal factors that could cause actual results to differ. For a more detailed description of the risks and uncertainties affecting Radware, refer to Radware’s Annual Report on Form 20-F, filed with the Securities and Exchange Commission (SEC), and the other risk factors discussed from time to time by Radware in reports filed with, or furnished to, the SEC. Forward-looking statements speak only as of the date on which they are made and, except as required by applicable law, Radware undertakes no commitment to revise or update any forward-looking statement in order to reflect events or circumstances after the date any such statement is made. Radware’s public filings are available from the SEC’s website at
www.sec.gov
or may be obtained on Radware’s website at
www.radware.com
.