Credential Stuffing Awareness

See how breached passwords fuel automated attacks.

What You'll Learn

Training Steps

  1. Welcome to TechNova Solutions

    Welcome to TechNova Solutions! You are Alice, a software engineer who has been with the company for three years. You take security seriously - you always lock your computer and never click suspicious links. But like many people, you have a favorite password that you use across several accounts. It's complex enough to be secure, so why not reuse it?

  2. A Normal Tuesday Morning

    It's Tuesday morning. You're working on a feature release when an email notification appears - something about suspicious activity on your account. You don't recall doing anything unusual. Must be a routine security alert.

  3. The Alarming Details

    Your heart sinks. Bucharest? You've never been there. And 47 failed attempts followed by a successful login at 3:47 AM? Someone definitely accessed your account. But how? You haven't clicked any suspicious links. You haven't shared your password with anyone. Then you remember - last month, you got an email about a data breach at StreamFlix, that video streaming service you signed up for years ago. You use the same password there as you do for your TechNova account...

  4. Connecting the Dots

    You scroll through your old emails and find the StreamFlix breach notification from three weeks ago. It mentioned that email addresses and passwords were exposed. At the time, you changed your StreamFlix password but didn't think to update your other accounts that used the same password. Now you realize - attackers took those leaked credentials and tested them against other services, including TechNova.

  5. The Red Flag You Missed

    Looking at the StreamFlix email again, you notice a critical warning you glossed over at the time.

  6. Contacting IT Security

    Alice needs to report this immediately. She picks up her phone to call IT Security using the extension from the original alert - not any number from external emails.

  7. Follow-Up from IT Security

    After the call, IT Security sends Alice a follow-up email with instructions on next steps.

  8. The Investigation Begins

    IT Security confirms that your account was accessed from Romania using valid credentials. The attacker accessed your email, downloaded several documents, and attempted to access the company VPN before the security systems flagged the unusual behavior. Fortunately, the security team detected the intrusion quickly. But the damage assessment is still underway.

  9. Understanding the Attack

    The security analyst explains how credential stuffing works: 1. Data Breach: Attackers obtain leaked credentials from a breach (like StreamFlix) 2. Credential Lists: They compile massive lists of email/password combinations 3. Automated Testing: Bots test these credentials against thousands of other sites 4. Account Takeover: When credentials work, they access and exploit those accounts This isn't targeted hacking - it's automated mass testing of stolen credentials.

  10. Filing the Incident Report

    IT Security asks Alice to file a formal incident report to document the compromise and help protect others.