Credential Stuffing Attack Cases: GS Retail & GS Home Shopping

By PLURA

In January–February 2025, a credential stuffing attack occurred on the online services of GS Retail and GS Home Shopping, leading to the leakage of personal information of tens of thousands of customers from both companies.
The attackers leveraged previously leaked account/password combinations to attempt mass automated logins. They exploited the vulnerability of some users reusing the same passwords across different websites, resulting in a breach.

Credential Stuffing on GS Retail & GS Home Shopping


1. Reconnaissance

🔍 Obtaining leaked account information

  • Collected already leaked account/password lists from various online communities and the dark web.
  • Focused on the possibility that GS Retail and GS Home Shopping customers reused identical passwords from other sites.

2. Initial Breach

🚨 Automated Credential Stuffing Attempts

  • Used scripts or bot programs to attempt logins with hundreds of thousands of account credentials.
  • Exploited weak defenses such as lack of retry limits (lockout) or multi-factor authentication (MFA).
  • Successfully logged in to a small percentage of accounts (approx. 0.1% success rate).

3. Information Collection

🗄️ Acquisition of personal and payment information

  • Accessed member profile pages and payment history through the logged-in accounts.
  • Collected personal information such as name, date of birth, address, phone number.
  • In some cases, partial credit card numbers and loyalty points were also exposed.

4. Data Exfiltration

📤 Data sent to external servers and resold

  • Transferred the harvested customer account and personal information to attacker-controlled servers and organized into separate lists.
  • Likely to be used for phishing, further financial fraud, and account resale.
  • It took over two weeks for GS Retail and GS Home Shopping to detect the attack, increasing the scale of damage.

5. Attack Method Diagram

sequenceDiagram
    participant Attacker
    participant DarkWeb
    participant GS_Server as GS Retail/GS Home Shopping Server
    participant DB as Customer DB

    Note over Attacker,DarkWeb: 1. Collect previously leaked credentials
    Attacker->>DarkWeb: Purchase or acquire account/password lists

    Note over Attacker, GS_Server: 2. Automated login attempts
    Attacker->>GS_Server: Credential stuffing using bot/script

    Note over GS_Server: 3. Successful login to some accounts
    GS_Server->>DB: Recognized as legitimate user, access DB

    Note over Attacker, DB: 4. Data theft
    GS_Server-->>Attacker: Return customer data (name, contact, etc.)

    Note over Attacker: 5. Classify and resell stolen data

🌟 PLURA-XDR Services