BusinessCybersecurityNewswireTechnology

DraftKings Users Hit by Widespread Account Hacks

▼ Summary

– DraftKings notified customers of credential stuffing attacks where hackers accessed accounts using stolen login credentials from other services.
– The attackers viewed limited customer data including names, contact info, and partial payment details but not sensitive identification or full financial data.
– DraftKings is requiring affected customers to reset passwords and enable multifactor authentication as a security measure.
– This follows a similar 2022 incident where $300,000 was stolen from accounts, though the current attack impacted fewer than 30 customers.
– The FBI has warned that credential stuffing attacks are a growing threat due to widely available leaked credentials and automated tools.

Sports betting leader DraftKings has alerted numerous customers about unauthorized account access stemming from a credential stuffing attack. This incident highlights the persistent cybersecurity risks facing online platforms, particularly those handling financial transactions and personal data. The company, a major player in fantasy sports and sportsbook operations with partnerships across major leagues, confirmed that attackers leveraged stolen login details from external sources to compromise user accounts.

In notifications dispatched on October 2, DraftKings clarified that while intruders viewed certain personal details, sensitive information such as full payment card numbers or government ID data remained secure. The breach exhibited classic signs of credential stuffing, where cybercriminals employ automated tools to test username and password combinations obtained from previous data breaches on other websites. This method proves particularly effective against individuals who reuse passwords across multiple online services.

Compromised accounts potentially exposed customer information including names, physical addresses, contact details, partial payment card digits, transaction histories, and account balances. DraftKings emphasized that the attackers didn’t access sufficient data to directly compromise banking accounts or execute identity theft schemes. The company attributed the incident to credentials stolen from non-DraftKings platforms, noting that their own systems weren’t breached.

As protective measures, DraftKings is mandating password resets for potentially affected accounts and requiring multifactor authentication for DK Horse platform access. Customers received recommendations to update passwords across other services, monitor financial statements, review credit reports, and consider implementing credit freezes or fraud alerts as precautionary steps.

This security event echoes a similar 2022 incident where hackers stole approximately $300,000 through credential stuffing, prompting DraftKings to reimburse nearly 68,000 affected customers. Federal investigators have repeatedly warned about the growing threat of credential stuffing attacks, fueled by widespread password reuse and readily available hacking tools.

In a subsequent clarification, DraftKings revised the impact scope, indicating that fewer than 30 accounts experienced suspicious login activity. Company representatives confirmed no evidence suggests DraftKings’ infrastructure was compromised or that login credentials originated from their systems. Crucially, the organization affirmed that no customers suffered financial losses due to this incident.

(Source: Bleeping Computer)

Topics

credential stuffing 95% data breach 93% account security 90% draftkings company 88% customer notification 85% financial loss 82% identity theft 80% multifactor authentication 78% fbi warnings 75% dark web 73%