
Modern credential stuffing attacks are cheap and easy to launch. Attackers obtain a list of stolen credentials, most commonly by buying a list off the dark web. A 2022 investigation found over 24 billion username and password pairs up for sale, and that number has only grown since then. Other methods of stealing credentials include PII harvesting, phishing and malware.
After procuring stolen credentials, cybercriminals deploy an army of bots to attempt thousands of logins on sites across the web. The login requests are typically spread out over multiple sites simultaneously to make the attacks harder to detect. E-commerce sites, financial institutions, online gaming and email accounts are popular targets.
A Harris Poll found that 66% of people use the same password for more than one online account. Users may not change their password after being notified of a data breach, or they may only reset it on one site but not another. This allows cybercriminals to use and re-use the same credentials in attacks on multiple sites.
If the credentials work and bots gain access to an account, they can proceed as the legitimate account owner. This results in an ATO, allowing the criminal to steal the value stored in an account. The stolen credentials can then be resold on the dark web, continuing the web attack lifecycle.