Jump to content
  • Sign Up
×
×
  • Create New...

Your information was probably stolen again: Researcher discovers 184 million stolen logins


Recommended Posts

  • Diamond Member

This is the hidden content, please

Your information was probably stolen again: Researcher discovers 184 million stolen logins

This is the hidden content, please

In another stark reminder of the constant threats online, cybersecurity researcher

This is the hidden content, please
recently uncovered a massive, unsecured database containing over 184 million login credentials from
This is the hidden content, please
, Apple,
This is the hidden content, please
, Discord,
This is the hidden content, please
,
This is the hidden content, please
and others. The trove amounted to approximately 47.42 GB of data, was discovered on a misconfigured cloud server and is believed to have been amassed using
This is the hidden content, please
– malicious software designed to extract sensitive information from compromised devices.

A global breach with far-Reaching implications

According to Jeremiah, the database also contained over 220 email addresses associated with government domains from at least 29 countries, such as the United Stated, United Kingdom, Australia, and Canada. The breadth underscores the potential national security risks posed by such breaches.

Fowlers analysis of a 10,000-record sample revealed that the data included plaintext usernames and passwords, with some entries linked to financial terms like “bank” and “wallet,” indicating a heightened risk of financial fraud. The presence of such sensitive information in an unprotected database amplifies concerns about identity theft, unauthorized access and other malicious activities.

This is the hidden content, please
has some images from the database provided by Jeremiah.

The role of infostealer malware

Infostealer malware operates by infiltrating devices through phishing emails, malicious websites, or comes bundled with pirated software. Once installed, it can harvest a variety of data, including login credentials, cookies, autofill information and even cryptocurrency wallet details. The data is then transmitted to command-and-control servers operated by cybercriminals.

The discovery of this database suggests a coordinated effort to collect and potentially exploit vast amounts of personal and institutional data. The lack of identifiable ownership or metadata within the database further complicates efforts to trace its origins or intended use. Hosting companies likely do not know that they are fostering these databases to begin with.

Immediate actions and recommendations

Upon discovering the database, Fowler promptly notified the hosting provider,

This is the hidden content, please
, which subsequently took the server offline. However, the duration for which the data remained exposed and wither it was accessed by unauthorized parties before its removal remains uncertain.

I would advise users to:

  • Change your passwords, yet again: Immediately update your passwords for all online accounts, especially if the same passwords are being re-used across multiple platforms
  • Enable two-factor authentication (2FA): This generally requires a text verification code to your phone, or a secondary email address
  • Monitor your accounts: Regularly check your financial accounts and other sensitive accounts for suspicious activity
  • Use reputable security software: Anti-virus and malware software from reputable companies usually help, make sure they are updated. You can check out our antivirus and malware reviews
  • Be cautious with emails and downloads: Avoid clicking on suspicious links or downloading attachments from unknown sources













This is the hidden content, please

#information #stolen #Researcher #discovers #million #stolen #logins

This is the hidden content, please

This is the hidden content, please

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.