SECURITYJuly 5, 2025·8 min read

What Actually Happens After a Data Breach: A Timeline

A data breach does not end when it is detected. Credential stuffing, account takeovers, and downstream fraud unfold over months. Here is the full timeline.

The timeline most people don't know

When a company is breached, the stolen data doesn't immediately appear on dark web markets and trigger account takeovers the next morning. There's a pipeline — discovery, exploitation, monetisation — that plays out over weeks to months. Understanding this timeline helps you prioritise your response.

Day 0 to Day 30: initial exploitation

Immediately after a breach, the attacker — or the group that purchased the stolen data — begins credential stuffing against high-value targets: major email providers, banking sites, cryptocurrency exchanges. They're looking for accounts where the same email/password combination opens something valuable. This stage is automated and high volume.

If you had an account at the breached site and used the same password elsewhere, this is when that risk materialises. The breach notification you'll receive from the company may come weeks after this stage is already complete.

Week 2 to Month 3: dark web sale

Larger breach datasets are often sold in batches on criminal marketplaces. The price depends on data freshness, completeness (email + password + name + address is worth more), and the target demographic (financial account credentials command premiums). Once sold broadly, the dataset is used by many more actors simultaneously.

Month 3 to Year 2: ongoing stuffing campaigns

Old breach data doesn't become worthless — it just becomes cheaper. Datasets from 2018 breaches are still being used in credential stuffing campaigns today because password reuse means old credentials still open current accounts. The useful lifetime of a breached credential is the lifetime of the account that reused it.

What you should do immediately after a breach notification

  1. Change the password at the breached site immediately
  2. Check if you used the same password anywhere else — change it there too
  3. Use PassGeni's Breach Checker to see if your credentials appear in other datasets
  4. Enable MFA on any account that uses the same email, especially your primary email
  5. Monitor your email for unusual password reset requests — these indicate credential stuffing against accounts using your email

The breach notification gap

Companies typically don't know they've been breached the moment it happens. Detection lag — the time between breach occurrence and detection — averages 200+ days in enterprise environments. You're often notified long after exploitation has already begun. Proactive breach monitoring (HIBP, PassGeni's breach checker) is more useful than waiting for notifications.

Key topics
data breach timelinecredential stuffingaccount takeoverbreach responseidentity theft
Was this post useful?
Frequently asked questions

Questions about this topic

How quickly do attackers use breached credentials?

+

How long does the impact of a data breach last?

+

What should I do if I am in a data breach?

+
More posts

Related reading