F5 Networks analyzed open source information on credential-spill incidents in recent years. The company’s analysis showed that half of all organizations take about 120 days or four months to discover a credential breach. The fifth stage is when attackers repackage spilled credentials and try to continue to use them. “The overarching conclusion is that credential stuffing is a very large problem,” F5’s Sander Vinberg says. Credentials for everything from domain administrator accounts to bank accounts, adult-site logins are readily available.”]

