Credential Stuffing Attack Cases: GS Retail & GS Home Shopping
By PLURA
In January–February 2025, a credential stuffing attack occurred on the online services of GS Retail and GS Home Shopping, leading to the leakage of personal information of tens of thousands of customers from both companies.
The attackers leveraged previously leaked account/password combinations to attempt mass automated logins. They exploited the vulnerability of some users reusing the same passwords across different websites, resulting in a breach.
1. Reconnaissance
🔍 Obtaining leaked account information
- Collected already leaked account/password lists from various online communities and the dark web.
- Focused on the possibility that GS Retail and GS Home Shopping customers reused identical passwords from other sites.
2. Initial Breach
🚨 Automated Credential Stuffing Attempts
- Used scripts or bot programs to attempt logins with hundreds of thousands of account credentials.
- Exploited weak defenses such as lack of retry limits (lockout) or multi-factor authentication (MFA).
- Successfully logged in to a small percentage of accounts (approx. 0.1% success rate).
3. Information Collection
🗄️ Acquisition of personal and payment information
- Accessed member profile pages and payment history through the logged-in accounts.
- Collected personal information such as name, date of birth, address, phone number.
- In some cases, partial credit card numbers and loyalty points were also exposed.
4. Data Exfiltration
📤 Data sent to external servers and resold
- Transferred the harvested customer account and personal information to attacker-controlled servers and organized into separate lists.
- Likely to be used for phishing, further financial fraud, and account resale.
- It took over two weeks for GS Retail and GS Home Shopping to detect the attack, increasing the scale of damage.
5. Attack Method Diagram
sequenceDiagram
participant Attacker
participant DarkWeb
participant GS_Server as GS Retail/GS Home Shopping Server
participant DB as Customer DB
Note over Attacker,DarkWeb: 1. Collect previously leaked credentials
Attacker->>DarkWeb: Purchase or acquire account/password lists
Note over Attacker, GS_Server: 2. Automated login attempts
Attacker->>GS_Server: Credential stuffing using bot/script
Note over GS_Server: 3. Successful login to some accounts
GS_Server->>DB: Recognized as legitimate user, access DB
Note over Attacker, DB: 4. Data theft
GS_Server-->>Attacker: Return customer data (name, contact, etc.)
Note over Attacker: 5. Classify and resell stolen data