credential stuffing Attacks & Data Breaches

7 data breaches have involved credential stuffing as the primary attack method or incident type. Credential stuffing uses stolen username/password combinations from previous breaches to attempt access across multiple services. It exploits password reuse—when users use the same credentials on multiple sites.

Impact: Successful credential stuffing leads to account takeover, fraud, and access to sensitive personal or business data.

Prevention: Multi-factor authentication, password managers, breach notification services, and rate limiting block credential stuffing attacks.

Understanding how credential stuffing attacks occur helps security teams prioritize defenses and incident response capabilities. Compare with other attack types like Ransomware, Phishing, or Supply Chain attacks. View the latest breaches across all incident types.

Classification: Incidents are categorized by the primary attack vector or root cause identified in breach disclosures and security research.
7
credential stuffing Incidents
Date Company Type Industry Country Severity Source
Mar 14, 2024 Roku credential stuffing Financial Services United Kingdom 6/10 View
May 29, 2023 Polish Credentials credential stuffing - - 8/10 View
Jan 7, 2019 Collection #1 credential stuffing - - 10/10 View
Sep 11, 2018 Kayo.moe Credential Stuffing List credential stuffing - - 9/10 View
Apr 2, 2018 Pemiblanc credential stuffing - - 10/10 View
Dec 16, 2016 Anti Public Combo List credential stuffing - - 10/10 View
Oct 13, 2016 Exploit.In credential stuffing - - 10/10 View

Unlock Full Breach Intelligence

Get complete access to our breach database with advanced search, API integration, threat actor attribution, and real-time monitoring for your security operations.

Full historical archive API access Real-time alerts Threat actor data Export to CSV/JSON

Contact access@breachsignal.com for enterprise pricing.