Scanning your connection...
Back to Glossary
Authentication

What is Credential Stuffing?

An automated attack that uses stolen username/password pairs from one breach to try logging into other services, exploiting password reuse.

Credential stuffing is one of the most common attacks on the internet. It works because people reuse passwords.

How It Works

  • Attacker obtains leaked credentials from a data breach
  • Automated tools try each username/password on dozens of other sites
  • Because people reuse passwords, a significant percentage will work
  • The attacker gains access to accounts the user didn't even know were connected

Scale

  • Billions of credentials are available from past breaches
  • Automated tools can test thousands of logins per minute
  • Success rates of 0.1-2% are common — at scale, that's millions of compromised accounts

Protection

  1. Never reuse passwords — use a password manager
  2. Enable 2FA on every account that supports it
  3. Use passkeys where available
  4. Check HaveIBeenPwned to see if your credentials were in a breach
  5. Monitor for unusual login activity on important accounts

Related Terms

Have more questions?

Use our guided flow to get the right next privacy step for Credential Stuffing.

Open Guided Flow