1080*80 ad

16 Billion Credentials Leak: Not a New Breach

Reports circulating about a massive 16 billion record dataset of compromised user credentials surfacing online have understandably caused concern. However, it is crucial to understand the nature of this data. This is not a recent, single data breach. Instead, this enormous collection is a compilation of user IDs and passwords gathered from literally thousands of previous data breaches and compromises that have occurred over many years.

Cybersecurity professionals are familiar with such compilations, often referred to under various names like “Compilation of Many Breaches” (COMB). These datasets are typically aggregated and shared by malicious actors looking to facilitate attacks like credential stuffing. In a credential stuffing attack, automated tools attempt to log into various online services using the vast lists of leaked username and password pairs, hoping that users have reused their passwords across different sites. Since so many people unfortunately reuse passwords, these compilations can be highly effective tools for fraudsters seeking unauthorized access to accounts, potentially leading to identity theft, financial loss, and further compromise.

The re-emergence or continued circulation of such large compilations serves as a critical reminder of the ongoing risks associated with using weak or reused passwords. While this specific dataset isn’t news in the sense of a new source of compromised data, its scale highlights the immense volume of sensitive information already circulating on the dark web and underground forums.

For individuals, the immediate and most effective action is to ensure strong, unique passwords are used for every online service. Utilizing a password manager is highly recommended to manage complex, unique passwords easily. Furthermore, enabling multi-factor authentication (MFA) or two-factor authentication (2FA) on all supported accounts adds a vital layer of security, making it significantly harder for attackers to gain access even if they have a correct username and password pair from a breach compilation. Organizations also need to be vigilant, implementing security measures to detect and block credential stuffing attacks and encouraging or enforcing the use of strong authentication methods among their users. This situation underscores that the threat comes not just from new breaches, but from the persistent availability and exploitation of old leaked data. Proactive password hygiene and robust authentication are the best defenses.

Source: https://www.bleepingcomputer.com/news/security/no-the-16-billion-credentials-leak-is-not-a-new-data-breach/

900*80 ad

      1080*80 ad