HACKER WARNING: Over a BILLION login and password details listed on the Dark Web

Tuesday, December 12, 2017
By Paul Martin

CYBERCRIMINALS have put on the Dark Web a massive database of 1.4billion e-mail, username and password details.

Tue, Dec 12, 2017

Login details, including username, password and e-mail credentials for some 1.4billion accounts, have been published in a database on the Dark Web.

The staggering amount of sensitive information is available unencrypted and indexed alphabetically, so it is easy to access and search through.

The data breach was discovered by security researchers at 4iQ, and the terrifying database on the Dark Web has a hefty 41GB file size.

Cyber security experts 4iQ said the credential breach aggregated 252 previous breaches.

It includes decrypted passwords from known previously breaches like LinkedIn as well as smaller breaches for Bitcoin and Pastebin sites.

A screenshot of some of the files found in the data breach was published by 4iQ.

Some of the file names listed mentioned Netflix, Gmail, LastFM, MySpace and PayPal.

PayPal’s recently acquired payment processor TIO Networks this month revealed that 1.6million customer had information stolen in a data breach.

While Netflix recently was the target of a scam e-mail that tried to trick users into handing over their login and password details.

And earlier this year it emerged over a million login credentials for Gmail and Yahoo accounts was being sold on the Dark Web.

Speaking about the database of 1.4billion login credentials, Julio Casal, founder of 4iQ, said: “None of the passwords are encrypted, and what’s scary is that we’ve tested a subset of these passwords and most of the have been verified to be true.”

Casal added: “This is not just a list. It is an aggregated, interactive database that allows for fast (one second response) searches and new breach imports.

“Given the fact that people reuse passwords across their email, social media, e-commerce, banking and work accounts, hackers can automate account hijacking or account takeover.

“This database makes finding passwords faster and easier than ever before. As an example searching for “admin,” “administrator” and “root” returned 226,631 passwords of admin users in a few seconds.”

Passwords found in the credential breach were analysed by 4iQ, and the findings underlined how important strong passwords are.

They published the top 40 passwords found within the data breach, and a large number of these passwords are easy to hack and guess.

The top password choice, used by more than 9.2million accounts, was 123456.

The Rest….HERE

Leave a Reply

Join the revolution in 2018. Revolution Radio is 100% volunteer ran. Any contributions are greatly appreciated. God bless!

Follow us on Twitter