What happens in the first 24 hours
Most people discover a breach weeks or months after it happened. By that point the stolen data has already moved through several hands and been used in ways the victim never sees. Understanding that timeline is the first step to defending against it.
Breaches rarely start with a random attacker stumbling onto an unprotected database. They are usually the result of months of reconnaissance, a purchased initial access point, or an employee falling for a phishing email. Once inside, attackers move quietly, collecting data over days or weeks before exfiltrating it all at once.
The attacker who stole your data is often not the same person who uses it. Credential theft is a supply chain. Different groups specialise in different parts of the operation, and stolen data flows through that chain with remarkable efficiency.
The stolen data supply chain
Here is the complete journey your data takes from the moment it is stolen to the moment it arrives in the hands of someone using it against you. Each stage has different actors and a different purpose.
After months of access, the attacker exports the database, often compressing it into structured files sorted by data type. Email lists, password hashes, and payment data are separated because they have different buyers and different values. The raw dump is verified for completeness before the attacker moves on.
Day 0High-value breaches are first listed on private, vetted dark web forums where prices are highest and buyers are sophisticated. The seller offers sample records to prove authenticity. At this stage only a handful of buyers see the data, paying a premium for exclusivity. This window typically lasts 24 to 72 hours for major corporate breaches.
Day 1 to 3After the exclusive window closes, data moves to larger, more accessible markets. Prices drop significantly as competition increases. Buyers at this stage include mid-tier fraudsters running credential stuffing operations, phishing kit operators who personalise attacks using the real names and account details in the dump, and bulk data aggregators who combine multiple breaches into larger combo lists.
Day 3 to 14Individual breaches get folded into enormous combo lists containing billions of email and password pairs from dozens of sources. These are the raw fuel for credential stuffing. A single combo list might contain your credentials from five different breaches spanning ten years, all merged into one searchable file. These lists are sold cheaply in bulk or shared freely on public forums.
Week 2 onwardsAutomated tools test your email and password combination against hundreds of services simultaneously. Banks, streaming platforms, e-commerce sites, airline loyalty programs, cryptocurrency exchanges. The tools rotate through residential proxies to avoid detection and log every successful login. A 1% success rate on a 100 million record list means one million compromised accounts.
OngoingSuccessful logins are monetised based on what was accessed. Bank accounts are drained or used for money mule transfers. Streaming accounts are sold in bulk for a few dollars each. Airline miles are redeemed or sold. Cryptocurrency balances are transferred immediately. Retail accounts are used for fraudulent purchases with stored payment methods. Each successful login has a market value that gets extracted quickly.
ImmediateWhat your data actually sells for
Dark web prices fluctuate based on freshness, the completeness of the record, and current demand. Here is a realistic picture of what different data types command in 2026 based on research into marketplace activity.
A credential from a breach announced yesterday can be worth 20 times more than the same credential from a two-year-old breach. Attackers race to monetise fresh data before victims change passwords. The faster you respond to a breach notification, the less value your data has to them.
How credential stuffing works at scale
Password reuse is the single biggest reason a breach at one company creates risk at every other company you use. Credential stuffing is the automated exploitation of that reuse, and it runs continuously against virtually every major platform.
A typical credential stuffing operation works like this: the attacker loads a combo list into a tool like Sentry MBA or a custom script. The tool sends login requests to a target site, rotating through thousands of residential proxies so each attempt looks like it comes from a different home user. Rate limiting and CAPTCHAs slow the attack but do not stop it. The tool logs every successful authentication and flags high-value accounts.
At a 0.5% success rate on a 500 million record list, that is 2.5 million successful logins. Against a bank that is potentially catastrophic. Against a retailer it means fraudulent orders charged to stored cards. Against any service it means access the attacker should not have.
Credential stuffing only works because people reuse passwords. A breach at a small forum you joined years ago becomes a breach of your bank account if you used the same password. Unique passwords for every account is the only complete defence against this attack.
Where you can interrupt the chain
Each stage of the data lifecycle has a point where your actions can break the attack before it reaches you. These are ordered by impact.
If every account has a different password, a credential stuffed from one breach cannot open any other account. A password manager generates and stores them so you never have to remember them. This single change eliminates the credential stuffing threat entirely.
The freshness window is real. Changing a compromised password within hours means your credential is worthless by the time most buyers receive the data. Monitoring services like DataLeakz alert you the moment your email appears in a new dump.
Even if an attacker has your correct password, a second factor stops them from completing the login. Authenticator app codes and passkeys are phishing resistant. SMS is better than nothing. Any 2FA breaks the automated stuffing operation cold.
If a breach included your name, address, date of birth, or SSN, a credit freeze at all three bureaus prevents new accounts being opened in your name. It is free and can be unfrozen in minutes when you need it. This directly interrupts the identity package monetisation pathway.
New breaches are discovered on a delay. Data sold privately months ago may only surface in public monitoring databases now. Continuous monitoring means you catch exposure at every stage of the supply chain, not just when the breach is first announced.
Real-time alerts for every transaction mean you catch fraudulent use within minutes rather than at the end of the month. Most banks offer this for free. Dispute windows are time-sensitive, so early detection directly affects how much of the damage you can recover.
Check your email against known breach databases instantly. Free, no account required.
Attackers depend on victims being slow. The credential stuffing operation runs for months because most people never change exposed passwords. The data stays valuable because nobody freezes their credit. Every fast action you take removes your data from the profitable part of this supply chain.
Sources
- IBM Cost of a Data Breach Report 2024 โ dwell time and breach lifecycle data
- SpyCloud Annual Credential Exposure Report 2025 โ combo list volume and credential stuffing statistics
- Recorded Future dark web marketplace pricing research 2024
- OWASP Credential Stuffing Prevention Cheat Sheet โ attack methodology
- Javelin Strategy and Research Identity Fraud Report 2025 โ financial fraud conversion rates