Hacking (using leaked data)

A system or account is infiltrated. This is done using passwords that were lost during a previous data leak.

There are countless lists of leaked login and password combinations circulating online. Attackers use these in automated attacks on online services in the hope that people have reused the same password on multiple sites. If you suspect a hacker has gained access to your passwords, immediately block any accounts using those passwords.

Last modification 09.10.2025

Top of page

https://www.ncsc.admin.ch/content/ncsc/en/home/cyberbedrohungen/credential_stuffing.html