Thursday, February 27, 2025
HomePassword AttacksVideo streaming Website Dailymotion Hacked | 85 Million user accounts Looted

Video streaming Website Dailymotion Hacked | 85 Million user accounts Looted

Published on

SIEM as a Service

Follow Us on Google News

Dailymotion  is a video-sharing website based in France on which users can upload, watch and share videos. It is one of the biggest video platforms in the world, offering a mix of content from users.

The hack was actually announced by Leakedsource after obtaining a database containing 87.6 million accounts, which has usernames, email address and around 18 million password hashes.

Leaked source who usually crack password from dumped sources, dosen’t have a plan of doing so due to it’s encryption strength. Passwords were hashed with the Bcrypt hashing algorithm, with 10 rounds of rekeying. For more details on Bcrypt.

“It would be a waste of resources for us to crack them, so we typically don’t bother,” a LeakedSource spokesperson told Bleeping Computer via email. “A determined hacker who wants to crack one person’s hash may still be able to.”

dm-dump

Even though passwords are hard to crack, users may be targeted for Phishing campaigns.

How can you stay protected?
  1. Consider using a password manager for additional security.
  2. Leakedsource indexed dailymotion data, you can check for your account breach.
  3. Pay more attention to suspicious email’s, may be they are Phishing emails.

Latest articles

New “nRootTag” Attack Turns 1.5 Billion iPhones into Free Tracking Tools

Security researchers have uncovered a novel Bluetooth tracking vulnerability in Apple’s Find My network...

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the...

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors...

10 Best WiFi Hacking Apps for Android – 2024 Edition

In this article, we are sharing the top “Wi-Fi hacking Apps“ for Android applicants....

Brutespray – Port Scanning and Automated Brute Force Tool

Brutespray is a Python script that provides a combination of both port scanning and automated...