On 20 August 2018, U.K. health and beauty retailer
Superdrug was targeted with an attempted blackmail, with hackers showing purported evidence that they had penetrated the company's site and downloaded 20,000 users' records. The evidence was most likely obtained from hacks and spillages and then used as the source for credential stuffing attacks to glean information to create the bogus evidence. In October and November 2016, attackers gained access to a private
GitHub repository used by
Uber (Uber BV and Uber UK) developers, using employees' usernames and passwords that had been compromised in previous breaches. The hackers claimed to have hijacked 12 employees' user accounts using the credential-stuffing method, as email addresses and passwords had been reused on other platforms.
Multi-factor authentication, though available, was not activated for the affected accounts. The hackers located credentials for the company's
AWS datastore in the repository files, which they used to obtain access to the records of 32 million non-US users and 3.7 million non-US drivers, as well as other data contained in over 100
S3 buckets. The attackers alerted Uber, demanding payment of $100,000 to agree to delete the data. The company paid through a
bug bounty program but did not disclose the incident to affected parties for more than a year. After the breach came to light, the company was fined £385,000 (reduced to £308,000) by the U.K.
Information Commissioner's Office. In 2019 Cybersecurity research firm Knight Lion Security claimed in a report that credential stuffing was favored attack method for
GnosticPlayers. == Compromised credential checking ==