Scanning your connection...
Back to Glossary
Authentication

What is Password Reuse?

The dangerous practice of using the same password across multiple accounts — meaning that when one service is breached, attackers can access all other accounts sharing that password through automated credential stuffing attacks.

Also known as: Password Recycling, Reused Passwords, Same Password Multiple Sites

Password reuse is the #1 most common security mistake people make — and it turns every data breach into a skeleton key to your entire digital life.

Why It's Dangerous

When you use the same password on multiple sites:

  1. One breach exposes all accounts — If LinkedIn is breached (it was — 164 million passwords in 2016), attackers try that password on your email, banking, and every other service
  2. Automated attacks scale infinitely — Bots test stolen credentials against thousands of sites within hours
  3. You won't know in time — Breached credentials are exploited before you hear about the breach

The Numbers

  • 65% of people reuse passwords across multiple accounts
  • 13 billion credential pairs are available on dark web markets
  • Credential stuffing succeeds on 0.1-2% of attempts — which at scale means millions of compromised accounts
  • The average person has 100+ online accounts — each one a potential entry point

How Attackers Exploit Reused Passwords

The Attack Chain

LinkedIn breached → Your email/password combo leaked →
Attacker tries same combo on Gmail → Success →
Password reset on your bank from Gmail → Bank compromised →
Password reset on everything else → Full digital takeover

Why Email Is the Crown Jewel

If attackers get into your email with a reused password, they can:

  • Reset passwords for every other service
  • Read password reset confirmation emails
  • Access financial accounts, cloud storage, social media
  • Impersonate you to contacts

The Solution

Use a Password Manager

  • Generates unique, random passwords for every account
  • Stores them securely — you only remember one master password
  • Auto-fills on websites and apps
  • Recommended: Bitwarden (open source), 1Password, KeePass (offline)

Check for Exposed Passwords

  • Use our Password Strength Analyzer — includes HIBP breach lookup
  • Check HaveIBeenPwned.com for your email
  • Most password managers flag reused and breached passwords

Prioritize Changes

If you've been reusing passwords, change them in this order:

  1. Email accounts (master key)
  2. Financial accounts (banking, investment, crypto)
  3. Cloud storage (Google Drive, iCloud, Dropbox)
  4. Social media (identity theft vector)
  5. Shopping (stored payment info)
  6. Everything else

Enable Two-Factor Authentication

Even with unique passwords, enable 2FA on every account that supports it — preferably hardware keys or authenticator apps (not SMS).

Related Terms

Have more questions?

Use our guided flow to get the right next privacy step for Password Reuse.

Open Guided Flow