A largest dark web database discovered in Underground Community Forum that contains almost 1.4 billions clear text Credentials and this dumb data’s belongs to 252 previous breaches.
This is one of the biggest credentials database that ever discovered in history and previous largest credential exposure, the Exploit.in combo list that exposed 797 million records.
A depth research has been conducted in this database and researchers confirms that non of the passwords are encrypted and most of them have been verified to be true.
This database consists of more scary information and its working ultimately fast response (one-second response) searches and new breach imports.
According to 4iQ Reseracher, The data is organized alphabetically, offering examples of trends in how people set passwords, reuse them and create repetitive patterns over time.
This single file database is very fastly responding to search the passwords than ever before. for an example, searching for “admin,” “administrator” and “root” returned 226,631 passwords of admin users in a few seconds.
Database file name mentioned “imported.log” with 133 addition or new breaches apart from 252 previous breaches.
Also Read: A new Hacker Group ‘MoneyTaker’ uncovered by Group-IB Attacking Banks in the USA and Russia
These are some of breach and number of password that have been leaked from the concern breaches.
This Database has recently updated ad 11/29/2017 was the last time this DB has updated and 41GB dump was found on 5th December 2017.
Exactly the total amount of Clear Text Credentials (usernames/clear text password pairs) is 1,400,553,869 and 14% of exposed username/passwords pairs had not previously been decrypted by the community and are now available in clear text.
“This new breach adds 385 million new credential pairs, 318 million unique users, and 147 million passwords pertaining to those previous dumps.”
These are the top 40 passwords list that has been used by the users from previous breaches.
Given the fact that people reuse passwords across their email, social media, e-commerce, banking and work accounts, hackers can automate account hijacking or account takeover.
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…
A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…
A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…