Wednesday, April 23, 2025
HomePassword AttacksPassword attack - Hacker Steals Millions of credentials from famous Internet Radio...

Password attack – Hacker Steals Millions of credentials from famous Internet Radio 8tracks

Published on

SIEM as a Service

Follow Us on Google News

Major password breach at 8tracks, millions of credentials stolen by hackers, as like the one happened in Dropbox, Linkedin, and Rambler.

Users who signed up through Facebook or Gmail authentication or safe and not affected by this leak and the users who signed up directly with 8tracks are affected by this leak.

They don’t store sensitive client information, credit card numbers, phone numbers, or street addresses, so stolen data doesn’t have any credit card information. 8tracks use to store credentials encrypted, which is good. As the credentials are encrypted it can be decrypted only through brute force.

- Advertisement - Google News

Also Read 100 Million unencrypted passwords Leaked From Russian portal

Brute force attack on the encrypted passwords is time-consuming and it will take lot of time even to decrypt a single password.

8tracks says "Passwords on 8tracks are hashed and salted, meaning that even we
can’t tell you what your password is by looking at the database. Although the
decryption of one particular user’s password through brute-force techniques is
unlikely, we recommend that users change their password on 8tracks and any sites
on which they may have used the same password to ensure their personal security."

Attack Vector

8tracks believe the attack was through their employee’s Github account, which doesn’t have two-factor Authentication. And they believe Hackers have no chance to get into the database of the live server, but they can reach the Backup server which has database tables and User’s data.

Also Read OneLogin Password Manager database Hacked Users

Now after the attack, they enforce 2-step authentication on Github, to keep code and validation keys isolated, and to enhance our password encryption.

Mitigation

Check with haveibeenpwned and change your passwords for 8tracks account and other online portals immediately.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Android Spyware Tricks Users by Demanding Passwords for Uninstallation

A newly identified Android spyware app is elevating its tactics to remain hidden and...

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors...

10 Best WiFi Hacking Apps for Android – 2024 Edition

In this article, we are sharing the top “Wi-Fi hacking Apps“ for Android applicants....