Credential Stuffing

7th May 2020 | Cybrary Credential Stuffing


credential stuffing cybrary term

Credential Stuffing is the autonomous injection of stolen username and password credentials in a web authentication function in the hopes of gaining unauthorized access to user accounts. Once an account login succeeds, the attacks quickly takes over the account.  At this point the hacker may perform fraudulent financial transactions, in the case of an email account they will scrape the accounts sent and deleted items folders for every last email address available to them.  They will likely target these individuals with new phishing attacks pretending to be the trusted party whose account has been hacked into.

Hackers generally gain these stolen credentials through users clicking on phishing attack links and entering their account information on fake website logins.  Alternately, they can purchase username and password databases on the dark web.  Finally, professional hackers will breach popular websites and steal the password database hoping it hasn’t been properly encrypted with salted and iteratively hashed passwords.

Source: Secret Security Wiki

Additional Reading: The Evolving Threat of Credential Stuffing

Related Terms: Phishing, Spear-Phishing, Trojan Horse

What should you do as an SMB?

Credential stuffing is another cyber attack that can be mitigated through proper cybersecurity education and awareness. Educating employees and using CyberHoot’s new phishing tests can reduce the likelihood that there is a security breach due to a user entering in credentials on a malicious site. The best way to defend against this type of attack is through proper password hygiene and training employees/staff on the dangers of phishing. Proper password hygiene can be simplified in these following steps:

  • Require employees to use a Password Manager;
  • Require employees to use a unique, complex 14+ character password or passphrase for each account you use;
  • Require Two-Factor Authentication on all Internet facing accounts;
  • Require employees change all passwords on accounts that aren’t unique;
  • Use CyberHoot’s Dark Web search tool (here) to see if any of your accounts have been exposed through online website breaches.

To learn more about Credential Stuffing, watch this short 5 minute video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Klopatra: New Android Trojan Drains Bank Accounts via Hidden VNC

Klopatra: New Android Trojan Drains Bank Accounts via Hidden VNC

Newly discovered Android banking Remote Access Trojan (RAT), dubbed Klopatra, has compromised more than 3,000...

Read more
When One Password Ends It All

When One Password Ends It All

In June 2025, KNP Logistics Group, a transport company in the UK with 500 trucks and nearly two centuries of...

Read more
Automated Vulnerability Scanning and Penetration Testing Boost Cyber Resilience

Automated Vulnerability Scanning and Penetration Testing Boost Cyber Resilience

Vulnerability scanning and it's human led partner penetration testing (aka "pentesting") are excellent and...

Read more