The Cost of Credential Stuffing

How Account Takeovers Damage Business Reputation

The Cost of Credential Stuffing
Adam Cassar

Co-Founder

3 min read

In recent months, Australian businesses have faced a wave of credential stuffing attacks. These attacks don't technically hack or breach the affected website, instead the attacks target customer accounts, leading
to fraudulent transactions. The impact on business reputation and customer trust cannot be overstated.

What is Credential Stuffing?

Credential stuffing occurs when attackers use login details obtained from a data breach to access accounts on other sites. To achieve this, criminals test out millions of credentials on a target website to identify working combinations. This attack affects users who reuse passwords across multiple services [1].

The Scale of the Problem

Tens of thousands (that we know of) Australian online accounts were accessed since late November 2023. This number grows each day [2]. The attacks affected major retailers and service providers, including:

  • The Iconic
  • Guzman y Gomez
  • Dan Murphy's
  • Event Cinemas
  • Stan

The Impact

While reusing passwords between sites has long been considered a no no, users persist in doing it. Blaming the customer, like 23andme did in their recent response to an attack, is not acceptable. Indeed, over 70% of American's believe that websites have a responsibility to prevent account takeovers via stuffing attacks. Not doing so can negatively impact a business in several ways.

Financial Impact

The impact can be both to the affected business and the affected client. Fraudsters made significant purchases using compromised accounts. One scammer claimed to have spent over $800 on high-end alcohol at Dan Murphy's [2]. Others bought iPhones and clothing. Either the customer will be out of pocket, or the business when the customer issues a chargeback on the purchase.

Reputation Damage

The attacks force businesses to address customer concerns and implement stronger security measures. The Iconic pledged to refund affected customers [1]. Dan Murphy's confirmed that a "small number of user accounts were subject to fraudulent transactions" [3].

Customer Trust

These incidents erode customer trust. Users expect businesses to protect their personal and financial information. When breaches occur, customers question the security practices of the affected companies.

Business Response

Companies responded by:

  1. Locking compromised accounts
  2. Issuing refunds
  3. Encouraging customers to change passwords
  4. Implementing stronger security measures

Dan Murphy's advised customers to "practise good password hygiene, using a strong password and changing it periodically" [3].

Prevention Strategies

To protect against credential stuffing, businesses should:

  1. Implement multi-factor authentication
  2. Educate customers about password security
  3. Monitor login behaviour on their website
  4. Implement, and regularly update, security measures, including bot management and advanced rate limiting.

Credential stuffing attacks pose a significant threat to business reputation and customer trust. Companies must prioritise cybersecurity to protect their customers and their brand.

Sources:

[^1^] ABC News: "The Iconic was hit by criminals taking money by 'credential stuffing'. How can you stay safe?" [^2^] Cyber Daily: "Guzman y Gomez, Dan Murphy's customers affected in credential stuffing campaign" [^3^] The Sydney Morning Herald: "Thousands of Australians hacked in 'credential stuffing' credit card scam"

Enterprise-Grade Security and Performance

Peakhour offers enterprise-grade security to shield your applications from DDoS attacks, bots, and online fraud, while our global CDN ensures optimal performance.

Contact Us

Related Content

Agentic AI vs. Your API

Agentic AI vs. Your API

Understand the shift from scripted bots to reasoning AI agents and how to adapt your security strategy for this new reality.

The Invisibility Cloak

The Invisibility Cloak

Learn how attackers combine residential proxies and anti-detect browsers to evade detection and how modern security tools can fight back.

The CAPTCHA Conundrum

The CAPTCHA Conundrum

Explore why traditional CAPTCHAs are failing both users and security, and discover modern, invisible alternatives.

Key Considerations for Effective Bot Management

Key Considerations for Effective Bot Management

With nearly half of all internet traffic being automated, a robust bot management strategy is essential. This article explores the key considerations for effective bot detection, classification, and response in the face of evolving threats.

How to Use Bot Management for IAM Use Cases

How to Use Bot Management for IAM Use Cases

Bots are used in both security and nonsecurity attacks. Identity and access management leaders must build a strong business case for a bot management capability or their organizations will incur avoidable losses due to account takeovers and also be unprepared to manage the risks introduced by customers using AI agents.

© PEAKHOUR.IO PTY LTD 2025   ABN 76 619 930 826    All rights reserved.