Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


16 Billion Apple, Facebook,Google and Other passwords leaked - Act now
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

16 Billion Apple, Facebook,Google and Other passwords leaked - Act now

«13

Comments

  • allthemtingsallthemtings Member, Megathread Squad

    end is nigh

  • sillycatsillycat Member

    Stealer logs. Lol.

  • jsgjsg Member, Resident Benchmarker

    Ignoring that neither reddit nor forbes ( to which reddit is linked) are sources of high reputation in cybersec ...

    Ooopsie - but: anyone really surprised?

    Thanked by 1ServerBachelor
  • Are we sure this is accurate and not just minimum wage journos sensationalizing the facts to get more clicks? Most big [tech] corps properly hash user passwords, so it is not possible to "leak" a password, just their hashes.

    Thanked by 2ServerBachelor mrTom
  • RubbenRubben Member

    thats why you have 2fa enabled for everything you can

    Thanked by 3PineappleM ehab jolo22
  • rustelekomrustelekom Member, Patron Provider

    @PineappleM said:
    Are we sure this is accurate and not just minimum wage journos sensationalizing the facts to get more clicks? Most big [tech] corps properly hash user passwords, so it is not possible to "leak" a password, just their hashes.

    Who knows. But using two-factor authentication is always better than not using it.

  • DecicusDecicus Member
    edited June 19

    @PineappleM said:
    Are we sure this is accurate and not just minimum wage journos sensationalizing the facts to get more clicks? Most big [tech] corps properly hash user passwords, so it is not possible to "leak" a password, just their hashes.

    Pretty sure it's just a result of passwords from previous breaches being tested on other services. I imagine they might've tested each credential pair on various services to see if they actually function there and if so, add them to this giant list (I don't think each of those services have actually been breached directly).

    Bad for those that re-use passwords (or maybe even use password patterns), but ultimately doesn't affect those that use randomly generated passwords for each account they have.

  • beanman109beanman109 Member, Megathread Squad

    @Decicus said:

    @PineappleM said:
    Are we sure this is accurate and not just minimum wage journos sensationalizing the facts to get more clicks? Most big [tech] corps properly hash user passwords, so it is not possible to "leak" a password, just their hashes.

    Pretty sure it's just a result of passwords from previous breaches being tested on other services. I imagine they might've tested each credential pair on various services to see if they actually function there and if so, add them to this giant list (I don't think each of those services have actually been breached directly).

    Bad for those that re-use passwords (or maybe even use password patterns), but ultimately doesn't affect those that use randomly generated passwords for each account they have.

    Bit more info here
    https://cybernews.com/security/billions-credentials-exposed-infostealers-data-leak/

  • DecicusDecicus Member

    @beanman109 said:

    @Decicus said:

    @PineappleM said:
    Are we sure this is accurate and not just minimum wage journos sensationalizing the facts to get more clicks? Most big [tech] corps properly hash user passwords, so it is not possible to "leak" a password, just their hashes.

    Pretty sure it's just a result of passwords from previous breaches being tested on other services. I imagine they might've tested each credential pair on various services to see if they actually function there and if so, add them to this giant list (I don't think each of those services have actually been breached directly).

    Bad for those that re-use passwords (or maybe even use password patterns), but ultimately doesn't affect those that use randomly generated passwords for each account they have.

    Bit more info here
    https://cybernews.com/security/billions-credentials-exposed-infostealers-data-leak/

    Do you expect me to read?

  • beanman109beanman109 Member, Megathread Squad

    @Decicus said:

    @beanman109 said:

    @Decicus said:

    @PineappleM said:
    Are we sure this is accurate and not just minimum wage journos sensationalizing the facts to get more clicks? Most big [tech] corps properly hash user passwords, so it is not possible to "leak" a password, just their hashes.

    Pretty sure it's just a result of passwords from previous breaches being tested on other services. I imagine they might've tested each credential pair on various services to see if they actually function there and if so, add them to this giant list (I don't think each of those services have actually been breached directly).

    Bad for those that re-use passwords (or maybe even use password patterns), but ultimately doesn't affect those that use randomly generated passwords for each account they have.

    Bit more info here
    https://cybernews.com/security/billions-credentials-exposed-infostealers-data-leak/

    Do you expect me to read?

    I thought the maid could read it to you as a bedtime story tonight

    Thanked by 3Decicus PineappleM Noct
  • RubbenRubben Member

    infostealers such a good name though

    should i start a summerhost called cpustealers? sounds better than cumhost...

    Thanked by 1PineappleM
  • nvmenvme Member

    @Rubben said:
    infostealers such a good name though

    should i start a summerhost called cpustealers? sounds better than cumhost...

    I vote for BandwidthBurglar, direct competitor of SurferCloud

    Thanked by 1oloke
  • rustelekomrustelekom Member, Patron Provider

    @PineappleM said:
    Are we sure this is accurate and not just minimum wage journos sensationalizing the facts to get more clicks? Most big [tech] corps properly hash user passwords, so it is not possible to "leak" a password, just their hashes.

    "Deciphering an 8-character password hash (for example) is essentially reversing the encrypted value back to its original form. If the password length is only eight characters long, the chances of successful recovery are significantly higher, especially if common encryption methods like MD5 or SHA-1 were used.

    ▌ What will be required?

    To successfully decipher a password hash, you need several resources:

    ▌ 1. Encryption Algorithm Identification

    Firstly, it's essential to determine which algorithm was used for hashing. Common algorithms include:

    • MD5: Very fast and simple method, easily cracked by modern tools.
    • SHA-1: Somewhat more complex but still vulnerable to brute force attacks.
    • bcrypt, scrypt, PBKDF2: Modern and much stronger against such attacks.

    ▌ 2. Attack Methodology

    There are two primary approaches to cracking hashes:

    ▌ a) Brute Force Attack

    This involves trying all possible combinations of alphanumeric values. For example, with an alphabet size of 62 symbols (a-z, A-Z, 0-9), there would be approximately 62⁸ ≈ 2⁴⁷ possibilities, making this attack feasible though computationally intensive. This approach works best on short and simple passwords.

    ▌ b) Using Rainbow Tables

    A rainbow table is a precomputed database that maps known passwords to their corresponding hash values. Such tables exist for 8-character passwords and allow quick lookups between a given hash and potential plaintext passwords.

    ▌ 3. Computing Power

    The speed of your attack depends heavily on computational power:

    • Regular Computer: An Intel Core i5/i7 processor can test about millions of hashes per second.
    • Graphics Cards (GPUs): Specialized tools like Hashcat or John the Ripper leverage GPUs' parallel processing capabilities, allowing billions of hashes to be tested per second.
    • Cloud Services: Platforms like Amazon Web Services (AWS) provide virtual machines equipped with multiple graphics accelerators for faster computations.

    ▌ Realistic Expectations

    An 8-character hash is relatively weak, particularly when using basic algorithms (like MD5). Even with moderately secure algorithms like bcrypt set at low iteration counts, it may still lead to successful password recovery within reasonable time frames provided sufficient computing resources.

    In conclusion, recovering an 8-character password is quite realistic if you have access to powerful hardware (such as GPUs or cloud services). However, keep in mind that unauthorized attempts could violate legal regulations unless explicit consent from data owners has been obtained."

    Of course, if you use a password of more than 16 characters, the probability of such an attack is reduced.

    Thanked by 1host_c
  • RubbenRubben Member

    infostealers such a good name though

    should i start a summerhost called cpustealers? sounds better than cumhost...> @nvme said:

    @Rubben said:
    infostealers such a good name though

    should i start a summerhost called cpustealers? sounds better than cumhost...

    I vote for BandwidthBurglar, direct competitor of SurferCloud

    1mbps.cloud

    Thanked by 1nghialele
  • nvmenvme Member

    @Rubben said:
    infostealers such a good name though

    should i start a summerhost called cpustealers? sounds better than cumhost...> @nvme said:

    @Rubben said:
    infostealers such a good name though

    should i start a summerhost called cpustealers? sounds better than cumhost...

    I vote for BandwidthBurglar, direct competitor of SurferCloud

    1mbps.cloud

    BandwidthHeist.io

  • RubbenRubben Member
    edited June 19

    @nvme said:

    @Rubben said:
    infostealers such a good name though

    should i start a summerhost called cpustealers? sounds better than cumhost...> @nvme said:

    @Rubben said:
    infostealers such a good name though

    should i start a summerhost called cpustealers? sounds better than cumhost...

    I vote for BandwidthBurglar, direct competitor of SurferCloud

    1mbps.cloud

    BandwidthHeist.io

    ma****groupchatmadeletdeadpool.host would be the end of all summer hosts

  • jsgjsg Member, Resident Benchmarker
    edited June 19

    @rustelekom said:

    @PineappleM said:
    Are we sure this is accurate and not just minimum wage journos sensationalizing the facts to get more clicks? Most big [tech] corps properly hash user passwords, so it is not possible to "leak" a password, just their hashes.

    "Deciphering an 8-character password hash (for example) is essentially reversing the encrypted value back to its original form. If the password length is only eight characters long, the chances of successful recovery are significantly higher, especially if common encryption methods like MD5 or SHA-1 were used.

    ▌ What will be required?

    To successfully decipher a password hash, you need several resources:

    ▌ 1. Encryption Algorithm Identification

    Firstly, it's essential to determine which algorithm was used for hashing. Common algorithms include:

    • MD5: Very fast and simple method, easily cracked by modern tools.
    • SHA-1: Somewhat more complex but still vulnerable to brute force attacks.
    • bcrypt, scrypt, PBKDF2: Modern and much stronger against such attacks.

    ▌ 2. Attack Methodology

    There are two primary approaches to cracking hashes:

    ▌ a) Brute Force Attack

    This involves trying all possible combinations of alphanumeric values. For example, with an alphabet size of 62 symbols (a-z, A-Z, 0-9), there would be approximately 62⁸ ≈ 2⁴⁷ possibilities, making this attack feasible though computationally intensive. This approach works best on short and simple passwords.

    ▌ b) Using Rainbow Tables

    A rainbow table is a precomputed database that maps known passwords to their corresponding hash values. Such tables exist for 8-character passwords and allow quick lookups between a given hash and potential plaintext passwords.

    ▌ 3. Computing Power

    The speed of your attack depends heavily on computational power:

    • Regular Computer: An Intel Core i5/i7 processor can test about millions of hashes per second.
    • Graphics Cards (GPUs): Specialized tools like Hashcat or John the Ripper leverage GPUs' parallel processing capabilities, allowing billions of hashes to be tested per second.
    • Cloud Services: Platforms like Amazon Web Services (AWS) provide virtual machines equipped with multiple graphics accelerators for faster computations.

    ▌ Realistic Expectations

    An 8-character hash is relatively weak, particularly when using basic algorithms (like MD5). Even with moderately secure algorithms like bcrypt set at low iteration counts, it may still lead to successful password recovery within reasonable time frames provided sufficient computing resources.

    In conclusion, recovering an 8-character password is quite realistic if you have access to powerful hardware (such as GPUs or cloud services). However, keep in mind that unauthorized attempts could violate legal regulations unless explicit consent from data owners has been obtained."

    Of course, if you use a password of more than 16 characters, the probability of such an attack is reduced.

    Thank you for that somewhat old-ish "schoolbook" explanation.

    But it's not as simple as that. Just one example: salted hashes; depending on salt size and domain this can thwart most common attacks for all not very major (read state or large and/or very well funded organisation) attackers.

    At the same time though 2FA often is misunderstood. It depends very strongly on 2 factors (pun not intended), namely the medium and the quality of the second factor. One somwhat ugly example is 4 to 6 digits (i.e. a very small domain) via SMS (i.e. a communication medium/channel that no professional would consider to be safe. That is, 2F auth. quite often is little more than sakkurity theater/marketing BS.

    And btw, it's very rarely (outside universities, etc) the algorithm that's attacked (and well attackable) but the implementation.

    All in all I'd be quite surprised if only about 2 accounts of every living person (on average) would have been hacked/pawned...

  • jndjnd Member

    Still quite vague about what exactly and how much is leaked:

    Researchers claim that most of the data in the leaked datasets is a mix of details from stealer malware, credential stuffing sets, and repackaged leaks.

    There was no way to effectively compare the data between different datasets, but it’s safe to say overlapping records are definitely present. In other words, it’s impossible to tell how many people or accounts were actually exposed.

    Collecting the info from hacked devices is certainly more plausible than acquiring database dumps of encrypted passwords and try to unhash them. But this way you won't get billion new logins. And with such large datasets (if they are real at all) it becomes harder and harder to verify their authenticity. So I for one will remain calm.

    If any siginificant leak happens there will be news full of it and most importantly people will notice being exploited rather than finding somewhere some mysterious TB worth of some random database dump.

  • sillycatsillycat Member

    @PineappleM said: Are we sure this is accurate and not just minimum wage journos sensationalizing the facts to get more clicks?

    Ding ding ding ding.

  • davidedavide Member

    "Minimum wage journos" :D

    That was my takeaway anyway

  • rustelekomrustelekom Member, Patron Provider

    Journalists may be stupid, but the fact remains that databases are now open to everyone. The number of leaked data is too high to just ignore it.

    Thanked by 2host_c jsg
  • host_chost_c Patron Provider, Top Host, Megathread Squad

    Shit, did anyone get some ****hub accounts??? :D

    On a serious note, 16 BILLION, hmm, nice.

    @rustelekom said: Journalists may be stupid, but the fact remains that databases are now open to everyone. The number of leaked data is too high to just ignore it.

    True.

    Thanked by 3nghialele jsg itzgeo
  • riderrider Member

    @Rubben said:
    thats why you have 2fa enabled for everything you can

    2fa is annoying much! :/

  • @rider said:

    @Rubben said:
    thats why you have 2fa enabled for everything you can

    2fa is annoying much! :/

    I keep an obsolete smartphone or (better) an iPad next to my PC for quick 2FA access. That way if god forbid I lose my actual mobile phone I don’t lose all my 2FA access with it (yes I do keep backup codes but still easier to delegate an obsolete device or tablet that always stay home for 2FA).

  • raindog308raindog308 Administrator, Veteran

    @rider said: 2fa is annoying much!

    So were passwords when I first encountered them. The systems I first played with back as a kid waaaaaaay back in the 70s didn't use them. First time I had to remember a password was like "oh man, what a pain..."

    @PineappleM said: delegate an obsolete device or tablet that always stay home for 2FA

    Why am I not doing this? I'm drowning in old phones.

    image

    Thanked by 1PineappleM
  • much surprise 😉

  • netguynetguy Member

    @raindog308 said: I'm drowning in old phones.

    old phones are so nice :)

  • SpiritsSpirits Member

    @PineappleM said:

    @rider said:

    @Rubben said:
    thats why you have 2fa enabled for everything you can

    2fa is annoying much! :/

    I keep an obsolete smartphone or (better) an iPad next to my PC for quick 2FA access. That way if god forbid I lose my actual mobile phone I don’t lose all my 2FA access with it (yes I do keep backup codes but still easier to delegate an obsolete device or tablet that always stay home for 2FA).

    Yes, add another old junk with no software and firmware security updates to expose your ass even more.

    So best is to not keep anything you wouldnt want others to see.

    Developers needs to be jailed for writing insecure software, and then maybe we will have less breaches/hacks.

    This crap has gone for too long unregulated and with no accountability for both companies and code writers.

    Thanked by 1rider
  • raindog308raindog308 Administrator, Veteran

    @Spirits said: Developers needs to be jailed for writing insecure software

    image

    @Spirits said: Yes, add another old junk with no software and firmware security updates to expose your ass even more.

    That old phone could be completely disconnected from the network (airplane mode) and still work as a 2FA authenticator. In fact I think you could permanently leave it in airplane mode and still setup 2FA accounts, etc.

Sign In or Register to comment.