Date First Published: 12th November 2023
Topic: Cybersecurity
Subtopic: Threats To Systems, Data & Information
Article Type: Computer Terms & Definitions
Difficulty: MediumDifficulty Level: 7/10
Learn about what credential stuffing is in this article.
Credential stuffing is a type of cyberattack that happens after a user account has been compromised. It involves the attacker trying the same username and password combination on other websites and services, particularly high-traffic and well-established websites and services, in the hope of correctly guessing it. Attackers often collect lists of stolen credentials that were exposed in previous data breaches to attempt to log into a website or online service.
Credential stuffing attacks have become more common due to lists of breached credentials being posted and sold. Bots are often used to capture the breached credentials and attempt to log into an online service or website. However, credential stuffing attacks usually have a very low rate of success, usually under 0.5%.
The following tips below can prevent credential stuffing:
Credential stuffing is very different from brute-force attacks. Brute-force attacks attempt to correctly guess a password by repeatedly submitting large numbers of passwords, often by randomly using a list of combinations or common passwords. Credential stuffing is one type of brute-force attack that uses breached data, greatly reducing the number of possible correct answers. Another difference between credential stuffing and brute-force attacks is that password strength does not protect against credential stuffing. Even if a strong password is reused across multiple accounts, it can still be guessed by credential stuffing.
If so, it is important that you tell me as soon as possible on this page.
Network Services Network Setups Network Standards Network Hardware Network Identifiers Network Software Internet Protocols Internet Organisations Data Transmission Technologies Web Development Web Design Web Advertising Web Applications Web Organisations Web Technologies Web Services SEO Threats To Systems, Data & Information Security Mechanisms & Technologies Computer Hardware Computer Software Ethics & Sustainability Legislation & User Data Protection