Often, this refers to databases of username/password combinations leaked from website breaches.

Protect accounts with 2FA to prevent unauthorized access, even if a password is known Google Safety Center.

Software testers and developers may use text files to hold dummy credentials for testing login systems.