Security researchers at dark web monitoring firm 4iQ have stumbled upon a massive 41GB data file of 1.4 million login credentials including emails and passwords – in clear text.
The cache, accumulated from various sources and breaches, is believed to be the largest of its kind. They are believed to be collected from several credential lists including Anti Public and Exploit.In, as well as other dumps from prominent data breaches at LinkedIn, MySpace, Netflix, Bitcoin, Pastebin, Last.FM, Zoosk, YouPorn, Badoo, RedBox, Minecraft and Runescape.
Researchers deemed it the largest aggregate database found in the dark web to date. Alarmingly, they added:
None of the passwords are encrypted, and what’s scary is the we’ve tested a subset of these passwords and most of the have been verified to be true.
Just as menacingly, the cache isn’t just a list. Rather, it makes for an aggregated interactive database that allows the malicious user to instantaneously search for passwords and new breach imports. The data is also organized alphabetically, revealing trends in how people form, reuse and create repetitive passwords over time.
“Given the fact that people reuse passwords across their email, social media, e-commerce, banking and work accounts, hackers can automate account hijacking or account takeover,” researchers wrote.
The 41GB dump was discovered on 5th December 2017 in an underground community forum. The database continues to be updated, with the last set of data inserted on 11/29/2017, bringing the total amount of credentials (usernames/clear text password pairs) to 1,400,553,869.
Image credit: Pixabay.
About the author
Florida’s health agency has warned of a data breach that may have exposed the data of up to 30,000...Read more arrow_forward
An Indian news publication has reported that the government’s biggest citizen database, a register...Read more arrow_forward
Hackers have broken into a high-profile plastic surgeon in London to steal a cache of sensitive...Read more arrow_forward