Task 1 of 4

Real Breach: Dunkin' Donuts Credential Stuffing

## How Automated Login Attacks Drained Loyalty Accounts In 2019, Dunkin' Donuts confirmed that attackers had compromised thousands of DD Perks loyalty accounts. The method: **credential stuffing and brute force**. Attackers used lists of leaked username/password pairs from other breaches and hammered the login endpoint with no slowdown. Customers woke up to find their loyalty balances — worth real gift card money — sold on underground forums. The company had no rate limiting and no lockout on failed attempts. Once attackers found that out, the attack ran on autopilot. --- ### Why This Works Login endpoints are the front door. Every system needs one. But many systems never enforce limits on *how many times you can knock*. Without protections, an attacker can try every possible combination automatically: - **Brute force** — try every possible value (0000 to 9999 for a 4-digit PIN = 10,000 guesses) - **Credential stuffing** — use real username/password combos leaked from other breaches - **Password spraying** — try one common password against thousands of accounts None of these require hacking skill. They require patience — and a script. --- ### The Three Protections That Stop This | Protection | What It Does | |---|---| | **Rate limiting** | Slow down after N attempts per IP per minute | | **Account lockout** | Lock after N failed attempts (e.g. 5 tries) | | **CAPTCHA** | Require a human challenge after failures | FirstBank has none of these. Time to prove it.