A type of attack on a user’s data, where attackers access the data with the previously leaked credentials of the victim. E. g. if user signed up on a.com and there was a data breach, attackers might try the same password for b.com.