Cluster of “megabreaches” compromises a whopping 642 million passwords (2024)

Biz & IT —

MySpace, Tumblr, and Fling are the latest services to join discredited LinkedIn.

Dan Goodin -

Cluster of “megabreaches” compromises a whopping 642 million passwords (1)

Less than two weeks after more than 177 million LinkedIn user passwords surfaced, security researchers have discovered three more breaches involving MySpace, Tumblr, and dating website Fling that all told bring the total number of compromised accounts to more than 642 million.

"Any one of these 4 I'm going to talk about on their own would be notable, but to see a cluster of them appear together is quite intriguing," security researcher Troy Hunt observed on Monday. The cluster involves breaches known to have happened to Fling in 2011, to LinkedIn in 2012, and to Tumblr 2013. It's still not clear when the MySpace hack took place, but Hunt, operator of the Have I been pwned? breach notification service, said it surely happened sometime after 2007 and before 2012. He continued:

There are some really interesting patterns emerging here. One is obviously the age; the newest breach of this recent spate is still more than 3 years old. This data has been lying dormant (or at least out of public sight) for long periods of time.

The other is the size and these 4 breaches are all in the top 5 largest ones HIBP has ever seen. That's out of 109 breaches to date, too. Not only that, but these 4 incidents account for two thirds of all the data in the system, or least they will once MySpace turns up.

Then there's the fact that it's all appearing within a very short period of time - all just this month. There's been some catalyst that has brought these breaches to light and to see them all fit this mould and appear in such a short period of time, I can't help but wonder if they're perhaps related.

All four of the password dumps are being sold on a darkweb forum by peace_of_mind, a user with 24 positive feedback ratings, two neutral ratings, and zero negative ratings. That's an indication the unknown person isn't exaggerating the quality of the data. The megabreach trend is troubling for at least a couple of reasons. First, it demonstrates that service providers are either unable to detect breaches or are willing to keep them secret years after they're discovered. Second, it raises the unsettling question where the trend will end, and if additional breaches are in store before we get there?

Of the four recently discovered breaches, the one affecting the most number of people is the MySpace hack, which compromised 360 million accounts. While that's the biggest known breach to hit a single online service, password cracking experts are already dismissing the value of the compromised data. That's because Myspace engineers truncated passwords to 10 characters and converted all letters to lower-case.

Still, the MySpace dump, like the other recently unearthed breaches, is likely to create problems for any of the affected users who employed the same user ID and password on other sites. Readers who are among this group should change their passwords as soon as possible.

Promoted Comments

  • Rommel102Ars Praefectuset Subscriptor

    hlv wrote:

    Rommel102 wrote:

    No idea if this is related but my normally calm main email account got hammered today with spam. I had to manually filter out 40+ emails.

    Very interesting... same thing happened to me. My Hotmail email was bombarded with spam all day.

    Double interesting as mine is also Hotmail.

  • oldtakuArs Praetorianet Subscriptor

    So anyone using a decent password manager and big unique random PWs is fine, which is hopefully everyone here.

    What's disturbing is the Tumblr thing - that was 3 years ago, they just decided to notify people about it this month, presumably because they were tipped that it was going to be made public, and they tried to play it down with the completely lame

    https://staff.tumblr.com/post/144263069 ... -party-had

    .

    It took someone else to look at the data and tell us it was 65M accounts, not some iddle widdle passive voice breach. That's three years someone could have been messing with your Tumblr account, if anyone had the stomach for it.

Promoted Comments

  • Rommel102Ars Praefectuset Subscriptor

    hlv wrote:

    Rommel102 wrote:

    No idea if this is related but my normally calm main email account got hammered today with spam. I had to manually filter out 40+ emails.

    Very interesting... same thing happened to me. My Hotmail email was bombarded with spam all day.

    Double interesting as mine is also Hotmail.

  • oldtakuArs Praetorianet Subscriptor

    So anyone using a decent password manager and big unique random PWs is fine, which is hopefully everyone here.

    What's disturbing is the Tumblr thing - that was 3 years ago, they just decided to notify people about it this month, presumably because they were tipped that it was going to be made public, and they tried to play it down with the completely lame

    https://staff.tumblr.com/post/144263069 ... -party-had

    .

    It took someone else to look at the data and tell us it was 65M accounts, not some iddle widdle passive voice breach. That's three years someone could have been messing with your Tumblr account, if anyone had the stomach for it.

Cluster of “megabreaches” compromises a whopping 642 million passwords (2024)

FAQs

How many compromised passwords are there? ›

Before diving into the nitty gritty of password security statistics, here are the top statistics to know: In 2022, over 24 billion passwords were exposed by hackers. (Digital Shadows, 2022) More than 80% of confirmed breaches are related to stolen, weak, or reused passwords.

What is the attacker tries several possible passwords in an attempt to guess the password? ›

A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your web site requires user authentication, you are a good target for a brute-force attack.

What is the most common way that a password can be compromised? ›

1. Phishing. Phishing is when a hacker posing as a trustworthy party sends you a fraudulent email, hoping you will reveal your personal information voluntarily. Sometimes they lead you to fake "reset your password" screens; other times, the links install malicious code on your device.

Which of the following password cracking attacks use random character and number combos to guess a password? ›

A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Hackers work through all possible combinations hoping to guess correctly.

Why is Chrome telling me my passwords are compromised? ›

Why we might ask you to change passwords. To help you secure your accounts, Google can help notify you if we find any of your saved passwords have been compromised. If you're notified about an unsafe password: Go directly to Password Checkup to make sure the notification is authentic and change any unsafe passwords.

What is the most common hacked password? ›

NordPass
Rank2021
1123456
2123456789
312345
4qwerty
16 more rows

What are the 3 main types of password attacks? ›

7 types of password attacks explained
  • Brute force attack. Brute force attacks refer to any method of generating or guessing passwords and then attempting to use them until attackers eventually gain access. ...
  • Dictionary attack. ...
  • Rainbow table attack. ...
  • Credential stuffing. ...
  • Keylogging. ...
  • Password sniffing. ...
  • Social engineering attacks.
Feb 6, 2024

What is the best defense against social engineering? ›

Top 10 Ways to Prevent Social Engineering Attacks
  1. Multi-Factor Authentication. ...
  2. Continuously Monitor Critical System. ...
  3. Utilize Next-Gen cloud-based WAF. ...
  4. Verify Email Sender's Identity. ...
  5. Identify your critical assets which attract criminals. ...
  6. Check for SSL Certificate. ...
  7. Penetration Testing. ...
  8. Check and Update your Security Patches.
Jan 2, 2024

Which technique do attackers use today to uncover a password? ›

BRUTE FORCE ATTACK

In a brute-force password attack, a hacker tries to access a secure user account through trial and error. This typically involves systematically entering every possible combination of letters, numbers, and symbols into a password field until one works.

Why is my iPhone telling me my passwords have been compromised? ›

Is the iPhone “compromised password” notification real? The message is legit. If you receive such a notification, your password matches an entry on a list of compromised data. However, it doesn't necessarily mean that it is your password personally, it might be someone else's password that matches yours.

What are signs your password has been compromised? ›

Here are a few telltale signs that your data has been compromised.
  • Your data is available on the dark web. ...
  • You are receiving password reset notifications. ...
  • You've been locked out of your accounts. ...
  • You're seeing unusual account activity. ...
  • A new credit line or loan appeared on your credit report.
Dec 21, 2022

How did all my passwords get compromised? ›

One of the most common causes of compromised passwords is the use of weak passwords that are easy to guess. Simple passwords, such as “123456” or “password”, are effortless for attackers to crack. Additionally, reusing passwords across multiple accounts significantly elevates the risk.

How long would it take a supercomputer to crack my password? ›

Using long passwords is critical to password strength. An 8-character password will take anywhere from a few minutes to a couple of hours to crack, while a 16-character password will take a hacker a billion years to crack.

What is password spraying? ›

Password spraying is a cyberattack tactic that involves a hacker using a single password to try and break into multiple target accounts. It's a type of brute-force attack. Password spraying is an effective tactic because it's relatively simple to carry out, and users often have easy-to-guess passwords.

Is brute force illegal? ›

In the vast majority of cases, a brute force attack is illegal. It is only legal when an organization runs a penetration test against an application and has the owner's written consent to do so.

How long will it take to crack a password in 2024? ›

A simple eight-character password can be cracked in only 37 seconds using brute force but it takes over a century to crack a 16-character one.

Should I be worried about compromised passwords? ›

Yes, you should be concerned about leaked passwords. A compromised password means unauthorized individuals can access your personal information and accounts. This can lead to financial fraud and identity theft. So, taking online privacy into your own hands is essential.

How many passwords does the average person have in 2024? ›

A survey conducted by NordPass in 2024 revealed a rapid growth in password usage for personal purposes, with an increase of nearly 70% in just over three years. According to the latest data, the number is now 168.

How many possible passwords are there in the world? ›

Using uppercase and lowercase letters, numbers, and eight symbols, with at least one character from each category, gives you 258,931,250,661,140,200,000,000,000,000 possible password combinations. Guessing a million passwords per second would take almost ten million years.

Top Articles
Latest Posts
Article information

Author: Nathanael Baumbach

Last Updated:

Views: 5575

Rating: 4.4 / 5 (55 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Nathanael Baumbach

Birthday: 1998-12-02

Address: Apt. 829 751 Glover View, West Orlando, IN 22436

Phone: +901025288581

Job: Internal IT Coordinator

Hobby: Gunsmithing, Motor sports, Flying, Skiing, Hooping, Lego building, Ice skating

Introduction: My name is Nathanael Baumbach, I am a fantastic, nice, victorious, brave, healthy, cute, glorious person who loves writing and wants to share my knowledge and understanding with you.