Credential Stuffing
An attack that replays username-password pairs from prior data breaches against other services, exploiting password reuse.
Last updated:
What is credential stuffing?
Credential stuffing is an automated attack in which the attacker takes a list of leaked username-password pairs — usually from a public breach corpus like "Collection #1" — and submits them against the login endpoints of unrelated services. The premise is password reuse: a fraction of users who had [email protected] / hunter2 breached on a forum in 2016 still use that same password on their bank, email provider, or retailer today. Even a 0.1% success rate on a 10-million-pair list yields 10,000 compromised accounts.
How it differs from brute force
Unlike a brute force attack, credential stuffing does not guess passwords — it replays known-valid ones. That makes it:
- Faster — one attempt per pair, not thousands
- Harder to block by rate limiting alone — successful logins look normal
- Harder to prevent with password complexity rules — the password was complex, it just leaked somewhere else
Attackers distribute the submissions across a botnet or proxy network so no single IP trips per-IP rate limits.
How defenders respond
Effective defenses combine IP reputation (traffic from datacenter ASNs and known abuse ranges is suspicious), device fingerprinting, CAPTCHA challenges on anomalous logins, and — most importantly — multi-factor authentication, which breaks the attack even when the password is correct. Monitoring your domain against breach-intelligence feeds catches credential stuffing in progress by spotting logins that match recently-leaked credentials. Running source IPs through an IP abuse report checker helps correlate the attack with known threat actors.