Post a Comment Print Share on Facebook
Featured Washington State Aaron Rodgers McConnell Ukraine Gaetz


Giant Leak of E-Mail addresses and passwords showed up

The number is enormous: 2'692 818'238 lines with access data for Internet services appeared in the network. But millions of E-Mail addresses and passwords in the network unencrypted and so readable.

The IT security researcher Troy Hunt met during his research in a hacker forum on the data leak. It could, at times, to be there, and also on the Cloud service Mega download. The magazine "Wired" called it the biggest Leak, which was previously known to the public.

in terms of the Numbers a little bigger, the two in 2016, known Yahoo-Leaks, one of which, respectively, three billion records were affected would in theory. However, both of these sensitive records are not yet showed up in the publicly viewable part of the network.

22 million passwords published

Otherwise, the "Collection #1", such as the well known data set is named. The origin of the data is exactly, is still unclear. Hunt, according to a variety of Websites are affected. Apparently, the Publishing is concentrated in the collection of a variety of older and newer Leaks.

Hunt wrote in a blog post that it had detected some data, about 140 million E-Mail addresses were also new for him. He have been adjusted for the collection of duplicates-and-dirty records, then approximately 770 million E-Mail are still addresses left, 22 million passwords.

the difference between The two Figures is explained by the fact that many users use different than recommended the same password for more than one page. In addition, different users can happen to use identical passwords, which relates in particular to simple passwords such as "123456".

detours Hacker get account data

With the Leak of the millions of access data are now hackers from all over the world available to the users to spy or to try to get to Shopping and banking data. This happens in the case of such large Leaks often called a "credential stuffing", which translates roughly as "Stuff with logon data". In the process, hackers can fire very long lists with E-Mail-password combinations from automated access to a system of a service, for example on Spotify.

The Software tried independently, with hundreds of thousands of access data sequentially to log in. At this mass, the Chance is not too small to land with some of the combinations of hits and to gain access to user accounts. An analysis of the IT security company Shape Security in the summer of 2018, according to 80 percent of Log-in Attempts to shopping pages from Unauthorized. Almost on a par with the Figures for the web sites of airlines.

user check whether you are affected

"Collection #1"-explorers, Hunt is recognized among professionals as the expert for the security of login data. He has loaded the latest Leak in his database that he has collected since a few years, Leaks. To help Internet users to protect themselves: On its Website you can check whether you are affected by the current Leak, or older. To do this, you need to enter in the search field, type an E-Mail address for Log-ins.

After a click on the "search" checks the website, whether or not the E-Mail address showed up in one of the Leaks from the past few years. You are not only shows, in which Leak this E-Mail address showed up, however, which password was used – that would be a security problem.

a collection of data "Collection #1", is also not clear which web sites or Apps are affected. Your own data should be affected so, then users should change as soon as possible your passwords for all the services to which this E-Mail address. (Editorial Tamedia)

Created: 17.01.2019, 15:02 PM

Your Name
Post a Comment
Characters Left:
Your comment has been forwarded to the administrator for approval.×
Warning! Will constitute a criminal offense, illegal, threatening, offensive, insulting and swearing, derogatory, defamatory, vulgar, pornographic, indecent, personality rights, damaging or similar nature in the nature of all kinds of financial content, legal, criminal and administrative responsibility for the content of the sender member / members are belong.