Friday, April 4, 2025
HomePassword AttacksVideo streaming Website Dailymotion Hacked | 85 Million user accounts Looted

Video streaming Website Dailymotion Hacked | 85 Million user accounts Looted

Published on

SIEM as a Service

Follow Us on Google News

Dailymotion  is a video-sharing website based in France on which users can upload, watch and share videos. It is one of the biggest video platforms in the world, offering a mix of content from users.

The hack was actually announced by Leakedsource after obtaining a database containing 87.6 million accounts, which has usernames, email address and around 18 million password hashes.

Leaked source who usually crack password from dumped sources, dosen’t have a plan of doing so due to it’s encryption strength. Passwords were hashed with the Bcrypt hashing algorithm, with 10 rounds of rekeying. For more details on Bcrypt.

“It would be a waste of resources for us to crack them, so we typically don’t bother,” a LeakedSource spokesperson told Bleeping Computer via email. “A determined hacker who wants to crack one person’s hash may still be able to.”

dm-dump

Even though passwords are hard to crack, users may be targeted for Phishing campaigns.

How can you stay protected?
  1. Consider using a password manager for additional security.
  2. Leakedsource indexed dailymotion data, you can check for your account breach.
  3. Pay more attention to suspicious email’s, may be they are Phishing emails.

Latest articles

Beware of Clickfix: ‘Fix Now’ and ‘Bot Verification’ Lures Deliver and Execute Malware

A sophisticated browser-based malware delivery method, dubbed ClickFix, has emerged as a significant threat...

DeepSeek-R1 Prompts Abused to Generate Advanced Malware and Phishing Sites

The release of DeepSeek-R1, a 671-billion-parameter large language model (LLM), has sparked significant interest...

Malicious PyPI Package Targets E-commerce Sites with Automated Carding Script

Cybersecurity researchers from Socket have exposed a malicious Python package on PyPI, named disgrasya,...

New Credit Card Skimming Campaign Uses Browser Extensions to Steal Financial Data

A newly discovered credit card skimming campaign, dubbed "RolandSkimmer," is exploiting browser extensions to...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Android Spyware Tricks Users by Demanding Passwords for Uninstallation

A newly identified Android spyware app is elevating its tactics to remain hidden and...

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors...

10 Best WiFi Hacking Apps for Android – 2024 Edition

In this article, we are sharing the top “Wi-Fi hacking Apps“ for Android applicants....