By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms
Computing

Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms

News Room
Last updated: 2025/03/26 at 5:47 AM
News Room Published 26 March 2025
Share
SHARE

Mar 26, 2025Ravie LakshmananPassword Security / Cybercrime

Threat actors are leveraging an e-crime tool called Atlantis AIO Multi-Checker to automate credential stuffing attacks, according to findings from Abnormal Security.

Atlantis AIO “has emerged as a powerful weapon in the cybercriminal arsenal, enabling attackers to test millions of stolen credentials in rapid succession,” the cybersecurity company said in an analysis.

Credential stuffing is a type of cyber attack in which an adversary collects stolen account credentials, typically consisting of lists of usernames or email addresses and passwords, and then uses them to gain unauthorized access to user accounts on unrelated systems through large-scale automated login requests.

Cybersecurity

Such credentials could be obtained from a data breach of a social media service or be acquired from underground forums where they are advertised for sale by other threat actors.

Credential stuffing is also different from brute-force attacks, which revolve around cracking passwords, login credentials, and encryption keys using a trial and error method.

Atlantis AIO, per Abnormal Security, offers threat actors the ability to launch credential stuffing attacks at scale via pre-configured modules for targeting a range of platforms and cloud-based services, thereby facilitating fraud, data theft, and account takeovers.

“Atlantis AIO Multi-Checker is a cybercriminal tool designed to automate credential stuffing attacks,” it said. “Capable of testing stolen credentials at scale, it can quickly attempt millions of username and password combinations across more than 140 platforms.”

E-Crime Tool Atlantis AIO

The threat actors behind the program also claim that it’s built on “a foundation of proven success” and that they have thousands of satisfied clients, while assuring customers of the security guarantees baked into the platform in order to keep their purchase private.

“Every feature, update, and interaction is crafted with meticulous attention to elevate your experience beyond expectations,” they state in the official advertisement, adding “we continually pioneer solutions that drive unprecedented results.”

Targets of Atlantis AIO include email providers like Hotmail, Yahoo, AOL, GMX, and Web.de, as well as e-commerce, streaming services, VPNs, financial institutions, and food delivery services.

Cybersecurity

Another notable aspect of the tool is its ability to conduct brute-force attacks against the aforementioned email platforms and automate account recovery processes associated with eBay and Yahoo.

“Credential stuffing tools like Atlantis AIO provide cybercriminals with a direct path to monetizing stolen credentials,” Abnormal Security said.

“Once they gain access to accounts across various platforms, attackers can exploit them in multiple ways — e.g., selling login details on dark web marketplaces, committing fraud, or using compromised accounts to distribute spam and launch phishing campaigns.”

To mitigate the account takeover risks posed by such attacks, it’s recommended to enact strict password rules and implement phishing-resistant multi-factor authentication (MFA) mechanisms.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Galaxy S25 Edge dummy unit shows off gorgeous black color, annoyingly off-centered USB-C port
Next Article Every Tesla Cybertruck Recall Since the launch. See the list
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Android 16 Introduces Wide-Ranging Features and Changes
News
Free Excel Time Blocking Templates to Boost Productivity
Computing
Meta debuts $399 AI-powered Oakley Meta HSTN smart glasses – News
News
Cybercriminals Breach Aflac, Private Customer Data Could Be at Risk
News

You Might also Like

Computing

Free Excel Time Blocking Templates to Boost Productivity

35 Min Read
Computing

The Blockchain Brain: Nodes, APIs and Web3 Infrastructure | HackerNoon

11 Min Read
Computing

Baidu-Geely JV reportedly discloses layoff package after clashes with employees · TechNode

1 Min Read
Computing

10 AI-Generated Content Examples To Inspire Your Own |

27 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?