Russian hacker group reportedly steals 1.2 billion passwords

Scorpus

Posts: 2,162   +239
Staff member

Hold Security, a Wisconsin information security firm, has revealed to The New York Times that a small Russian hacker group has amassed a humongous database of usernames and passwords. In total, the group allegedly has 1.2 billion username/password combinations, stolen from around 420,000 websites through SQL injection attacks.

Due to disclosure agreements, Hold Security couldn't name the hacker group, nor which sites were affected, claiming some are still potentially vulnerable to further hacks. However, the group did target a diverse range of websites, anything from Fortune 500 companies to smaller websites and businesses.

The south-central Russian group includes just a small number of young men - fewer than a dozen - that know each other in real life. While the group has amassed such a large number of passwords, not many have been sold on the black market. Instead, the group appears to focus on spamming people through social networks, collecting funds from those who request the spam attacks.

The group also appears to make use of botnets to test which websites are potentially vulnerable to SQL injections, later returning to any flagged sites to perform a manual extraction. Through dividing tasks amongst the group members, the team can work efficiently to amass stolen credentials.

This isn't the first time Hold Security has discovered large wads of stolen information being used maliciously. In February of this year, the company discovered 360 million usernames and passwords up for sale in underground forums, as well as 1.25 billion email addresses from multiple breaches.

Through alerting people of large-scale data theft, the company hopes people and other business will place an increased focus on security personal information and online credentials.

Permalink to story.

 
Likelihood of changing all my passwords every time a story comes out about "hacker group steals a bazillion passwords".....low. Numb.
 
Isn't there a difference between stealing hashes and stealing passwords? I doubt a dozen Russians will run hashcat long enough to break good passwords with at the low hanging fruit they can get in a few days. Or did they actually intercept pain text passwords?
 
For me I use a random password generator for all my passwords and yes they are diffrent
 
My LastPass has my back so I'm not worried about this incident.
 
My password is : notrealpassword
They will never use this one. It is not real
 
Back