credential stuffing Attacks & Data Breaches
7 data breaches have involved credential stuffing as the primary attack method or incident type. Credential stuffing uses stolen username/password combinations from previous breaches to attempt access across multiple services. It exploits password reuse—when users use the same credentials on multiple sites.
Impact: Successful credential stuffing leads to account takeover, fraud, and access to sensitive personal or business data.
Prevention: Multi-factor authentication, password managers, breach notification services, and rate limiting block credential stuffing attacks.
Understanding how credential stuffing attacks occur helps security teams prioritize defenses and incident response capabilities. Compare with other attack types like Ransomware, Phishing, or Supply Chain attacks. View the latest breaches across all incident types.
| Date | Company | Type | Industry | Country | Severity | Source |
|---|---|---|---|---|---|---|
| Mar 14, 2024 | Roku | credential stuffing | Financial Services | United Kingdom | 6/10 | View |
| May 29, 2023 | Polish Credentials | credential stuffing | - | - | 8/10 | View |
| Jan 7, 2019 | Collection #1 | credential stuffing | - | - | 10/10 | View |
| Sep 11, 2018 | Kayo.moe Credential Stuffing List | credential stuffing | - | - | 9/10 | View |
| Apr 2, 2018 | Pemiblanc | credential stuffing | - | - | 10/10 | View |
| Dec 16, 2016 | Anti Public Combo List | credential stuffing | - | - | 10/10 | View |
| Oct 13, 2016 | Exploit.In | credential stuffing | - | - | 10/10 | View |
Unlock Full Breach Intelligence
Get complete access to our breach database with advanced search, API integration, threat actor attribution, and real-time monitoring for your security operations.
Contact access@breachsignal.com for enterprise pricing.