Automated Password Hacking Machine: Use of Passwords Need to Stop

| Updated on April 2, 2025
An automated password hacking machine poses a critical threat

The Infostealer Malware danger warnings must be heeded. The report says the gravity of the threat, where billions of compromised passwords were stolen, 85 million of the most recent ones in use in attacks right now. Even with that, two-factor authentication does not appear to be enough since hackers can bypass 2FA by stealing session cookies. 

The shared risk increases with a report announcing how millions of stolen passwords are now being used by an automated hacking tool called Atlantis AIO for penetrating email accounts, VPNs, streaming services, and even food delivery platforms. The most important message: Stop using your current passwords as of now.

Credential stuffing is not a new term; to be clear, this is what one has to establish right from the start. Yet, more than that, it continues to be one of the most dangerous attack techniques, becoming increasingly so. Innovative tools are constantly put into place against cybercriminals as evidenced by the findings of a report dated March 15. The report detailed internal communications of the so-called Black Basta ransomware group on their automated brute-force attack framework. 

As the terms brute-force and credential stuffing imply, these attacks bombard an account with numerous username and password combinations in hopes of finding the correct one. While this is a simplified overview, hackers can exploit lists of stolen or compromised credentials available on dark web marketplaces and various criminal forums to access other accounts that utilize the same passwords.

A Threat Intelligence Report from Abnormal Security dated March 25 raises concerns about using Atlantis AIO that has the capability of using millions of stolen passwords for credential-stuffing attacks. “Atlantis AIO has emerged as a powerful weapon in the cybercriminal arsenal,” analysts at Abnormal Security stated, “enabling attackers to test millions of stolen credentials in rapid succession.”

Aimee Pearcy

Tech Journalist


×