By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
News Dailys
  • Home
  • Curious Tech
  • History & Untold Stories
  • Science & Space
  • Surprising Facts & Lists
Reading: Why Billions of Stolen Passwords Keep Working Years After the Breach
Font ResizerAa
News DailysNews Dailys
  • Home
  • Curious Tech
  • History & Untold Stories
  • Science & Space
  • Surprising Facts & Lists

Search

  • Home
  • Curious Tech
  • History & Untold Stories
  • Science & Space
  • Surprising Facts & Lists

Follow us

Home » Why Billions of Stolen Passwords Keep Working Years After the Breach

Curious Tech

Why Billions of Stolen Passwords Keep Working Years After the Breach

Nathaniel Brooks
By
Nathaniel Brooks
Nathaniel Brooks
ByNathaniel Brooks
Nathaniel Brooks is an Editorial Writer at News Daily covering science, technology, and the questions being worked out at the edges of human knowledge — from...
Follow:
Last updated: May 19, 2026
Share
10 Min Read
SHARE

Contents
The Infrastructure of ReuseWhy Password Hygiene Fails at the Human LevelThe Design Decisions That Made This PossibleWhat Actually Works

There is a filing cabinet problem at the center of the modern internet. Not a metaphorical one, a structural one. Every time a company stores your password and then loses control of its servers, that password enters the market. It gets packaged, traded, sold, and eventually tested against hundreds of other sites you use. The breach makes the news for a week. The password has circulated for years.

Last year, researchers tracking dark-web credential markets estimated that researchers tracking dark-web credential markets estimated that billions of username-and-password pairs were actively in circulation. Not just stolen. Actively used. The gap between those two words is where the real story lives.

The Infrastructure of Reuse

Source: Unsplash

Most people understand that data breaches happen. Fewer understand what happens next. When a company’s database is breached, and passwords are extracted, the stolen credentials don’t vanish into some hacker’s private collection. They flow into a well-organized secondary market, dark-web forums, Telegram channels, and private broker networks, where they’re sold, sometimes in bulk packages of tens of millions of records, for prices that have dropped to near zero as supply has massively outpaced demand.

The buyer’s goal isn’t to break into that specific company. It’s to run what security researchers call credential stuffing. Automated bots take the stolen username-and-password combinations and test them against thousands of other sites. Banking portals. Streaming services. Airline reward accounts. Retail loyalty programs. If you used the same password on a breached forum you joined in 2016 as you use on your bank account today, the math is simple,e and the outcome is predictable.

What makes this work at scale is speed. Modern credential-stuffing toolkits can test enormous volumes of login attempts per hour, ur potentially hundreds of thousands or more,o re depending on the target and infrastructure. The bots rotate IP addresses to avoid detection, mimic realistic browser behavior, and solve basic security prompts automatically. By the time a financial institution’s fraud team spots unusual login patterns, a percentage of accounts has already been accessed.

And here’s the strange part: the passwords that power this entire ecosystem weren’t stolen yesterday. A lot of them came from breaches that nobody talks about anymore. A 2014 leak at one company might fuel account takeovers in 2024 if users never changed their credentials. Stolen passwords don’t expire. They just wait.

Why Password Hygiene Fails at the Human Level

Source: Unsplash

Security researchers and corporate IT teams have spent two decades telling people to use unique passwords for every account. The advice is correct. The problem is that it runs directly against how human memory works.

The average person manages somewhere between 80 and 100 online accounts. That number has roughly doubled in the past decade. The cognitive load of maintaining genuinely unique, complex passwords for each one is, for most people, functionally impossible without a tool. And adoption of password managers, while growing, still reaches only a fraction of general internet users.

So people reuse. They reuse with small variations, adding a “1”, capitalizing the first letter, and appending an exclamation point. Security researchers call these transformations, and cracking tools account for them. When a stolen password database is processed by a cracking algorithm, the algorithm doesn’t just test the original password. It tests thousands of common variations automatically. The “1” at the end offers almost no protection.

The problem compounds across generations of accounts. Most people have online accounts they’ve completely forgotten about. Old retail sites, defunct social platforms, and hobby forums from the early 2000s. Those accounts, if they were breached, still carry valid email addresses and passwords that likely overlap with current accounts. There is no mechanism to alert you. The breach may never have been publicly disclosed.

The Design Decisions That Made This Possible

Source: Unsplash

None of this is accidental. The internet’s authentication infrastructure was built on assumptions that haven’t aged well.

Early web architects designed password-based login because it was simple, cheap, and required no special hardware. The system assumed that breaches would be rare enough that individual passwords would retain their value as secrets. That assumption failed badly once the web scaled to billions of users, and databases storing hundreds of millions of credentials became routine targets.

Here’s the thing. The specific failure point is password hashing, the process that converts stored passwords into scrambled strings. Done right, hashing makes a stolen database useless without enormous computing power to crack it. Done wrong, with outdated algorithms or no salting, a stolen database is readable almost immediately. The gap between those two outcomes comes down to decisions made by an IT team years before anyone thought a breach was likely.

For years, a significant portion of companies stored passwords with weak or outdated methods. Security researchers have documented major breaches where millions of passwords were stored in plain text or with easily broken hashing algorithms. The 2012 LinkedIn breach and the RockYou leak are the cases that keep getting cited. The companies involved weren’t necessarily reckless by the standards of their time. They were following practices that were normal before the breach economy existed.

The economy matured. The practices didn’t go fast enough.

What Actually Works

Source: Unsplash

Multi-factor authentication, requiring a second proof of identity beyond a password, breaks credential stuffing at the login stage. A stolen username and password combination is useless if the attacker also needs access to a phone number, an authenticator app, or a hardware key. Security researchers consider MFA the single most effective countermeasure against account takeover at the individual level.

Adoption rates for MFA remain stubbornly uneven. Banks and financial institutions have moved toward mandatory MFA for most account actions. Social media platforms offer it, but rarely require it. Small businesses and individual service providers often implement it poorly or not at all.

Passkeys, a newer authentication standard developed by the FIDO Alliance and now supported by major platforms including Apple, Google, and Microsoft, are designed to replace passwords entirely. Instead of a shared secret stored on a server, passkeys use cryptographic key pairs where the private key never leaves your device. A breach of a company’s authentication database yields nothing useful to an attacker, because the secret was never stored there.

Rollout is underway. It is slow. The infrastructure required to support passkeys broadly is still being built, and user adoption requires both platform support and behavioral change, historically the harder problem.

In the meantime, the credential market churns. Old passwords get packaged with new ones. Automated tools test millions of combinations daily. The breach headlines keep coming, and most readers glance at them, think vaguely about changing their passwords, and don’t.

The math of that gap, between awareness and action, is what the credential economy runs on. It has been running on it for a long time.

This article was created with AI assistance and reviewed for clarity and accuracy.

Newsletter

TAGGED:cybersecuritydata breachesinternet privacystolen passwords reused
Share This Article
Facebook Pinterest Copy Link Print
Nathaniel Brooks
ByNathaniel Brooks
Follow:
Nathaniel Brooks is an Editorial Writer at News Daily covering science, technology, and the questions being worked out at the edges of human knowledge — from deep space radio signals to AI research and the methodology behind both. He reads research papers for fun and is suspicious of any headline that outruns its evidence. Most likely to be found mid-documentary on a niche topic he will bring up at an inopportune moment.
Previous Article The Forgotten Legal Battle Over a Town That Wanted to Stop Existing
Next Article Americans Paid $189 Billion in Bank Fees Last Year And Almost None of It Was Inevitable
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

You Might Also Like

Curious Tech

The telephone switchboard was a perfect machine. That’s exactly why it had to die.

Curious Tech
May 19, 2026
Curious Tech

The jukebox cracked music discovery in 1950. Spotify hasn’t yet.

Curious Tech
May 18, 2026
Curious Tech

How 1973’s CB Radio Craze Predicted Every Social Network’s Rise and Fall

Curious Tech
May 17, 2026
Curious Tech

How the Polaroid camera invented instant culture and why Silicon Valley never fully cracked it

Curious Tech
May 17, 2026
News Dailys

News Daily

Categories

  • Curious Tech
  • Money & Economic History
  • Science & Space
  • Surprising Facts & Lists
  • History & Untold Stories

Get in Touch

  • About us
  • Editorial Team
  • Corrections Policy
  • Editorial Standards & Ethics Policy
  • Privacy Policy
  • Terms and Conditions
  • Contact us
© 2026 News Daily. All Rights Reserved.