Credential stuffing: £2.31 million fine shows passwords are still the weakest link

Partner Content If you're still using "password123" for more than one account, there's a good chance you've already exposed yourself to credential stuffing attacks — one of the most prevalent and damaging forms of automated cybercrime today. Just ask the 6.9 million users of 23andMe who discovered their personal details were compromised when cybercriminals used recycled credentials from other breaches to infiltrate their accounts.

The consequences extended far beyond the initial breach. In 2025, 23andMe received a  £2.31 million regulatory fine  from the UK's Information Commissioner's Office. A costly lesson in the dangers of weak password habits.

But what is credential stuffing, really? Credential stuffing is a systematic attack method where threat actors use stolen username and password combinations from previous data breaches to gain unauthorized access to user accounts across different platforms.

Strip away the fancy terminology and it's just cybercriminals playing "guess who?" with your login details. Threat actors use automated tools to try huge lists of stolen credentials (think: email/password combos) across multiple websites.

The goal? Find out where else those credentials work, and crack open accounts for identity theft, fraud, or just plain chaos. It's not brute force. It's credential recycling on a massive scale, using stolen usernames and passwords from one breach to break into dozens of other accounts.

The domino effect: from 14,000 to 6.9 million

The hacker behind the 23andMe breach operating under the alias "Golem" exploited the widespread practice of password reuse across multiple platforms. A critical factor enabling the attack's success was 23andMe's lack of rate limiting in their login API, which allowed attackers to make unlimited login attempts without triggering security mechanisms. By automating login attempts with stolen credentials, Golem was able to compromise around 14,000 accounts directly.

However, the real damage came from the interconnected nature of 23andMe's DNA Relatives and Family Tree features. Once inside these accounts, the attacker could access sensitive data of users linked through shared genetic information, leading to the exposure of approximately 5.5 million DNA Relatives profiles and 1.4 million Family Tree profiles. This incident highlights how weak authentication and networked data-sharing can rapidly amplify the consequences of credential stuffing attacks.

The mechanics of credential stuffing

The attack vector is straightforward: when users reuse passwords across multiple services, a single data breach can compromise their entire ecosystem. Criminals acquire databases containing millions of leaked credentials from previous security incidents, then systematically attempt these login combinations across banking platforms, email services, social media, and corporate systems.

The scale of these operations is significant. Automated bots can test millions of credential combinations per minute across multiple targets, making manual detection and prevention challenging.

Credential stuffing vs brute force and credential harvesting

Let's get our terms straight. Credential harvesting is the act of collecting login details — through phishing, malware, or data breaches. Credential stuffing is what happens next. Attackers use those harvested credentials en masse to break into other accounts. So, harvesting is the "shopping," stuffing is the "checkout." And unlike brute force attacks (where hackers try every possible password), credential stuffing bets on human laziness — reuse of the same passwords everywhere.

The risks of credential stuffing

Credential stuffing might seem like a simple attack, but its consequences ripple far beyond a single compromised account.

  • Identity theft and account takeover. Credential stuffing is expensive. Once attackers get in, they can steal personal info, drain bank accounts, or commit identity theft.
  • Data breaches and security breach consequences. One successful credential stuffing attack can trigger a domino effect of data breaches. Suddenly, your company's internal documents, customer data, and even intellectual property are up for grabs.
  • Business disruption and operational damage. When credential stuffing attacks succeed against business accounts, the impact extends beyond data theft. Attackers can disrupt operations, lock out legitimate users, corrupt databases, or use compromised accounts as launching pads for further attacks within the organization's network.

Credential stuffing is the slow drip torture of cybersecurity. These automated attacks exploit password reuse, testing stolen credentials against legitimate services at massive scale. The UK sees thousands of these attacks every year, targeting everything from retail and banking to government portals.

How to detect credential stuffing

Here are some key indicators and methods to identify such attacks:

  • Unusual login activity. Sudden spikes in failed logins, high authentication request volumes, or access from unfamiliar locations may indicate automated bot attacks.
  • Behavioral anomalies. Detect unusual user behavior, such as odd login times or multiple accounts accessed from the same IP.
  • Unusual account activity. Watch for suspicious actions like data downloads or account setting changes after login.
  • Rate-limiting and CAPTCHA triggers. Frequent triggers suggest bots attempting brute-force logins.
  • Monitoring dark web activity. Track mentions of your organization's credentials on dark web forums for early warnings.
  • Repeated use of known breached credentials. Check logins against leaked credential databases to spot compromised accounts.

By using these methods, organizations can detect and address credential stuffing attacks proactively.

Cyber attack prevention strategies

Threat intelligence is marketed as a cure-all but often falls short, proving too slow or too noisy to detect real threats. Despite investments in firewalls, SIEMs, and AI tools, basic security practices are still overlooked. Here's your essential checklist:

  • Multi-factor authentication. If attackers only have your password, MFA keeps them out. It's simple and effective, yet adoption rates remain embarrassingly low across industries.
  • Bot protection and web app security. Modern web apps need to detect and block automated login attempts. Rate limiting, CAPTCHA, and behavioral analytics help, but they're not foolproof.
  • Secure infrastructure. Protect APIs, encrypt sensitive data, and conduct regular security audits.
  • Monitoring and detection. Real-time alerts, anomaly detection, and automated response workflows are essential. But don't expect miracles from your SIEM if you're still using "qwerty" as your admin password.
  • Account management best practices. Use account lockouts, session timeouts, and role-based access controls.
  • Password hygiene. Encourage strong, unique passwords and recommend password managers.
  • Password managers. Here's the tool everyone talks about but few deploy properly. Password managers eliminate the root cause: password reuse and weak credentials. They help users generate and store strong, unique passwords for every account — reducing the attack surface dramatically.

The real fix? Stop reusing passwords. Educate users. Enforce strong password policies. Monitor for suspicious logins. Deploy proper bot defenses, and use a reliable password manager.

Passwork: closing the door on credential stuffing

Most password managers promise security, but end up buried under clunky interfaces and forgotten master passwords. Passwork flips the script. Instead of adding friction, it makes strong password hygiene effortless.

How does Passwork help? Credential stuffing thrives on password reuse and weak credentials. Passwork eliminates both. It generates complex, unique passwords for every account and stores them securely, so you never have to recycle or remember them.

Why is Passwork different? It's designed for actual humans, not just security experts. The interface is intuitive. Users aren't punished for doing the right thing. Unique, strong passwords for every account become the default. And because Passwork makes it easy, users don't forget to update passwords or fall back on lazy habits.

Advantages Passwork brings to the table:

  • Effortless password generation and rotation. With Passwork, creating and updating strong passwords is as easy as clicking a button. No more password fatigue.
  • Centralized, secure access. Passwork organizes credentials in encrypted vaults, with granular access controls. You decide who gets what, and revoke access instantly when roles change or security risks emerge.
  • Streamlined onboarding and offboarding. New employees get secure access without endless email chains. Departing staff lose access the moment they leave — no lingering credentials floating around.
  • Audit trails and monitoring. Every password change, access event, and login is logged. You know exactly who did what and when, making compliance and investigations straightforward.
  • Integration with your workflow. Passwork plugs into popular business tools and browsers, so users don't have to jump through hoops. Password management happens where work happens.
  • Enterprise authentication integration. SSO support and LDAP connectivity let users access Passwork with corporate accounts, reducing password fatigue while maintaining centralized directory control.
  • Zero-knowledge architecture and end-to-end AES-256 encryption. Passwork ensures that only you and your authorized users can access your data. All information is encrypted before it leaves your device and remains protected at every stage.

Passwork  closes that gap, making security simple and efficient. It offers an on-premise password management solution, enabling organizations to maintain complete control over the storage and handling of sensitive information. Passwork is ISO 27001 certified and tested by HackerOne. For organizations that take security seriously, choosing a password manager with proven compliance and independent verification is essential.

Conclusion

Credential stuffing attacks remain one of the most pervasive and damaging threats to organizational security, thriving on password reuse and inadequate access controls. These attacks are automated, persistent, and often go undetected until the damage is done. Traditional security measures provide only partial protection against the scale and sophistication of these threats.

If your organization is ready to take ownership of its security posture and move beyond reactive measures, Passwork delivers the reliability, transparency, and control needed to defend against today's credential-based threats.

Discover more about Passwork at  passwork.pro .

Contributed by Passwork.

https://go.theregister.com/feed/www.theregister.com/2025/10/07/credential_stuffing_231_million/