Credential abuse is the effort by a hacker to access a system using stolen or created credentials of authorized users. It’s an offshoot of credential stuffing, whereby attackers use a brute force attack to send a list of compromised user credentials (user names, passwords) to break into a system.