SECURITYFebruary 28, 2025·6 min read

What Is Credential Stuffing and Why Your "Unique" Password Matters

Credential stuffing automates login attempts using breached username/password pairs. Here is how it works and why unique passwords per site are non-negotiable.

Where the credentials come from

Over 12 billion username/password combinations are available for purchase on dark web markets right now. They come from thousands of data breaches over the past 15 years. LinkedIn (2016), Adobe (2013), RockYou (2009), Collection #1 (2019) — every major breach contributes to the pile. These lists are sorted, deduped, and sold for a few hundred dollars per billion records.

How credential stuffing attacks actually work

An attacker buys a credential list and runs it through a tool like Sentry MBA or SNIPR configured for a specific target site. The tool handles rate limiting, CAPTCHA solving (via bypass services), and proxy rotation to avoid IP blocks. It tests hundreds of thousands of username/password pairs per hour, automatically logging successful logins.

The key insight: the attacker isn't trying to crack your password. They're testing whether your leaked password from LinkedIn also works on your bank, because they know most people reuse passwords across sites.

Why your 'unique' password actually needs to be unique

Password reuse is the entire attack surface for credential stuffing. A completely unique password on every site means a credential stuffing attack using your LinkedIn credentials will fail on every other site — the attacker gets one account and nothing more.

This is impossible to manage manually. You need a password manager, or you need to use PassGeni to generate and use genuinely unique passwords for every account. Using the same base password with minor variations ("Netflix1", "Amazon1", "Gmail1") doesn't help — attackers run rule-based variations automatically.

The breach checker as your first line of defence

PassGeni's breach checker uses k-anonymity to check your passwords against 12+ billion compromised credentials without revealing your actual password. If a password comes back as compromised, change it immediately — on that site and every other site where you used it.

Run your important passwords through the breach checker now. Your email, banking, and any work credentials should be checked first. A positive result isn't the end of the world — it's information you need to act on.

Key topics
credential stuffingaccount takeoverbreach reuseunique passwordsbotnet login attacks
Was this post useful?
Frequently asked questions

Questions about this topic

What is the difference between credential stuffing and brute force?

+

How do attackers get the credential lists used for stuffing?

+

If a site I use gets breached, how quickly are my other accounts at risk?

+
More posts

Related reading