Credential Stuffing: When One Breach Becomes Many

If you've ever reused a password across multiple accounts — and most people have — you're a potential target for credential stuffing. It's one of the most common and effective attack methods used by cybercriminals today, and it exploits a very human habit: choosing convenience over security.

What It Is

Credential stuffing is a type of automated cyberattack where hackers take large lists of leaked usernames and passwords (usually obtained from previous data breaches) and systematically try them across dozens or hundreds of different websites. The logic is simple: if someone used the same email and password for both a gaming forum and their online banking account, breaking into one effectively breaks into the other.

Unlike brute-force attacks, which try random or dictionary-based passwords, credential stuffing uses real credentials that have already proven to work somewhere. This makes it significantly more efficient and harder to detect.

How It Works

The process typically follows a predictable pattern:

  1. Data acquisition — Attackers purchase or download breached credential databases from dark web marketplaces. Some lists contain hundreds of millions of username/password pairs.
  2. Automation — Using specialized tools (sometimes called "account checkers" or credential stuffing frameworks), attackers load the stolen credentials and point them at a target login page.
  3. Distributed attack — To avoid triggering rate-limiting or IP blocking, attackers route traffic through botnets or large numbers of residential proxies, making it appear as though login attempts come from thousands of different users around the world.
  4. Harvesting valid accounts — The software flags any successful logins, giving attackers access to verified accounts. These are either exploited directly, sold on, or used for further fraud.

Success rates are generally low — often between 0.1% and 2% — but when you're testing millions of credentials, even 0.5% translates to thousands of compromised accounts.

Why It Matters for VPN Users

VPN users aren't immune to credential stuffing — in fact, there's a specific angle worth knowing about. Some VPN providers have themselves been targeted. In past incidents, credential stuffing attacks against VPN services have resulted in attackers accessing users' accounts and, in some cases, their connected devices or private configurations.

Beyond that, using a VPN doesn't protect you if your credentials are already compromised. A VPN hides your IP address and encrypts your traffic, but it can't stop an attacker from logging into your Netflix, email, or bank account with a password you reused from a breached site.

However, a VPN can help reduce your exposure in indirect ways. By masking your real IP address, it becomes harder for trackers and data brokers to build profiles linking your various online accounts — which can limit the blast radius when breaches do occur.

Real-World Examples

  • In 2020, credential stuffing attacks hit multiple VPN providers and video streaming services simultaneously, with attackers testing credentials stolen from unrelated gaming and retail breaches.
  • Disney+ experienced a wave of account takeovers shortly after launch — not due to a breach of Disney's systems, but because users had recycled passwords from other compromised services.
  • Financial institutions regularly see credential stuffing attempts in the millions per day, most deflected by rate limiting and multi-factor authentication.

How to Protect Yourself

The defense is straightforward, even if the habit change isn't:

  • Use a unique password for every account. A password manager makes this practical.
  • Enable two-factor authentication (2FA) wherever possible. Even if an attacker has your password, they won't have your second factor.
  • Check breach databases like HaveIBeenPwned to see if your credentials have been exposed.
  • Monitor account logins for unfamiliar locations or devices.

Credential stuffing works because people reuse passwords. Stop doing that, and the attack largely stops working on you.