Thursday, February 13, 2025
HomePassword AttacksPassword attack - Hacker Steals Millions of credentials from famous Internet Radio...

Password attack – Hacker Steals Millions of credentials from famous Internet Radio 8tracks

Published on

SIEM as a Service

Follow Us on Google News

Major password breach at 8tracks, millions of credentials stolen by hackers, as like the one happened in Dropbox, Linkedin, and Rambler.

Users who signed up through Facebook or Gmail authentication or safe and not affected by this leak and the users who signed up directly with 8tracks are affected by this leak.

They don’t store sensitive client information, credit card numbers, phone numbers, or street addresses, so stolen data doesn’t have any credit card information. 8tracks use to store credentials encrypted, which is good. As the credentials are encrypted it can be decrypted only through brute force.

Also Read 100 Million unencrypted passwords Leaked From Russian portal

Brute force attack on the encrypted passwords is time-consuming and it will take lot of time even to decrypt a single password.

8tracks says "Passwords on 8tracks are hashed and salted, meaning that even we
can’t tell you what your password is by looking at the database. Although the
decryption of one particular user’s password through brute-force techniques is
unlikely, we recommend that users change their password on 8tracks and any sites
on which they may have used the same password to ensure their personal security."

Attack Vector

8tracks believe the attack was through their employee’s Github account, which doesn’t have two-factor Authentication. And they believe Hackers have no chance to get into the database of the live server, but they can reach the Backup server which has database tables and User’s data.

Also Read OneLogin Password Manager database Hacked Users

Now after the attack, they enforce 2-step authentication on Github, to keep code and validation keys isolated, and to enhance our password encryption.

Mitigation

Check with haveibeenpwned and change your passwords for 8tracks account and other online portals immediately.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Critical Chrome Flaw Allows Attackers to Remotely Execute Code

Google has released an urgent update for its Chrome browser to address a critical...

Global IoT Data Leak Exposes 2.7 Billion Records and Wi-Fi Passwords Worldwide

A massive security lapse has exposed over 2.7 billion records, including sensitive Wi-Fi credentials,...

Palo Alto PAN-OS Zero-Day Flaw Allows Attackers to Bypass Web Interface Authentication

Palo Alto Networks has disclosed a zero-day vulnerability in its PAN-OS software (CVE-2025-0108), allowing...

Enhancing Threat Detection With Improved Metadata & MITRE ATT&CK tags

The cybersecurity landscape continues to evolve rapidly, demanding more sophisticated tools and methodologies to...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors...

10 Best WiFi Hacking Apps for Android – 2024 Edition

In this article, we are sharing the top “Wi-Fi hacking Apps“ for Android applicants....

Brutespray – Port Scanning and Automated Brute Force Tool

Brutespray is a Python script that provides a combination of both port scanning and automated...