Browse Definitions :
Definition

credential stuffing

Credential stuffing is the practice of using stolen login information from one account to gain access to accounts on a number of sites through automated login. The exploit can allow hackers and those buying stolen credentials to access not just the accounts from the sites they are stolen from but any account where the victim uses the same password.

After obtaining credentials for a number of sites, a hacker may sell a list of user IDs, passwords and email addresses. It is common for these lists to be sold on underground or on the dark web. Whether lists are sold or used by the hacker themselves, it is likely the holder of the account details will want to get as much value from the accounts as possible.

Even though a single account was breached, it can lead to the simultaneous compromise of other sites used by the victim because the credentials are input for multiple sites using automated logins. The attacker often compromises multiple accounts before the user is aware that their account for any site has been breached.

Credential stuffing is a serious threat to both consumers and businesses, which both stand to lose money, either directly or indirectly. In retail in the United Kingdom, it is claimed that over 90 percent of logins come from credential stuffing attacks rather than authentic users. Eliminating these logins could make a significant impact on decreasing credential stuffing.

From an end-user perspective, it's recommended to create different and sufficiently strong passwords for each site. For the site or service provider, tools such as Shape Security's Blackfish or Fortinet's Fortiguard can help fight credential stuffing.

This was last updated in February 2018

Continue Reading About credential stuffing

Networking
  • What is wavelength?

    Wavelength is the distance between identical points, or adjacent crests, in the adjacent cycles of a waveform signal propagated ...

  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

Security
CIO
  • What is a startup company?

    A startup company is a newly formed business with particular momentum behind it based on perceived demand for its product or ...

  • What is a CEO (chief executive officer)?

    A chief executive officer (CEO) is the highest-ranking position in an organization and responsible for implementing plans and ...

  • What is labor arbitrage?

    Labor arbitrage is the practice of searching for and then using the lowest-cost workforce to produce products or goods.

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
Close