Blog
Arrow back
SHARE THIS ARTICLE
Blog

Roku data breach explained: Everything you need to know

02 May, 2024

Roku, a well-known streaming service offering access to platforms such as Netflix and Disney Plus, recently reported its second breach of 2024.


With two breaches occurring within just four months, questions are beginning to rise about the company's security measures and reputation.


Let's explore how such a major player in the streaming industry continues to struggle with their cybersecurity.


Let’s take a look inside…


On March 8th, Roku reported a cyberattack that affected around 15,000 users, and a month later on April 12th, a second incident was reported where 576,000 additional accounts were affected.


It was through the investigation and close monitoring that the second incident was discovered.


Among the affected accounts, approximately 400 fell victim to hacker activity. Unauthorised purchases on the streaming service were made, although no sensitive information was compromised.


Roku promptly addressed the issue by issuing refunds to the hacked accounts.


According to Roku, both attackers employed a technique known as credential stuffing, utilising stolen login credentials to gain unauthorised access to user accounts.


Roku stated ‘It’s possible third-party sources provided the login information’.


Additionally, the company highlighted the role of poor password hygiene among users, which could have contributed to the breaches.


In response to the breaches, Roku has implemented a forced password reset for all users, irrespective of whether they were directly affected by the breaches. Since, Roku have implemented a mandatory two-factor authentication requirement for all accounts,


What role did human error play in this breach?


This breach highlights the vulnerability stemming from human negligence towards cybersecurity.


The technique used, called credential stuffing, thrives on exploiting weak password practices overlooked by many users.


By reusing passwords or choosing weak ones, users inadvertently made it easier for attackers.


Users need to take ownership of their own cybersecurity, especially when trusting large companies, assumed to have strong security.


This incident shows that even big corporations can fall victim to cyber threats, emphasising the collective responsibility of everyone in strengthening cyber defences.


What is credential stuffing?


Credential stuffing is a type of cyberattack where hackers use stolen usernames and passwords from one source and try them on multiple websites or services.


It's like trying a key that you stole from one door on many different doors, hoping it will unlock some of them.


This technique relies on the fact that many people reuse the same passwords for different accounts, making it easier for hackers to gain unauthorised access.


It's a sneaky way for cybercriminals to break into accounts and potentially access sensitive information or carry out fraudulent activities.
Strong password practices your organisation can implement to prevent credential stuffing


One of the most effective ways to mitigate the risk of breaches, such as the recent incidents experienced by Roku, is by enhancing password practices.


Here are some essential steps to take to strengthen password security:


  • Create unique and complex passwords for each online account. Avoid common phrases, predictable patterns, or easily guessable information such as birthdays or pet names.
  • Utilise passwords that are at least 12 characters long and include a combination of uppercase and lowercase letters, numbers, and special characters. Longer, more complex passwords are more difficult for attackers to crack.
  • Never use the same password across multiple accounts. Reusing passwords significantly increases the risk of credential stuffing attacks, as compromised credentials from one platform can be leveraged to access others.
  • Use reputable password managers to securely store and generate strong, unique passwords for each account. Password managers alleviate the burden of remembering multiple passwords while enhancing security.
  • Remember to regularly update passwords, ideally every three to six months, to reduce the likelihood of unauthorised access due to compromised credentials.
  • Enable two-factor authentication wherever possible. 2FA provides an additional layer of security by requiring users to verify their identity through a second method, such as a one-time code sent to their mobile device.

How Bob’s Business can help your organisation


At Bob's Business, we understand the importance of strong cybersecurity measures in protecting your organisation against breaches.


Our comprehensive cyber courses are tailored to provide organisations with the knowledge and tools needed to mitigate cyber risks effectively.


Through engaging and informative training modules, we educate users on the importance of strong password practices, the dangers of credential-stuffing attacks, and the implementation of two-factor authentication.


Our platform equips users with practical skills to identify and respond to potential threats, fostering a culture of cybersecurity awareness and resilience within your organisation. Explore our range of courses here.


Back to resources

Ready to build your cybersecurity culture?

Whether you’re looking for complete culture change, phishing simulations or compliance training, we have solutions that are tailor-made to fit for your organisation.

Girl with laptop
Boy with laptop
man and woman with laptops
ISO27001
ISO9001
Global Cyber Alliance