Close Menu
    Facebook X (Twitter) Instagram
    Mediarun Search
    Facebook X (Twitter) Instagram
    Mediarun Search
    Home»Tech»Biggest theft in history: Hacker publishes list of 10 billion passwords
    Tech

    Biggest theft in history: Hacker publishes list of 10 billion passwords

    Osmond BlakeBy Osmond BlakeJuly 13, 2024No Comments2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Biggest theft in history: Hacker publishes list of 10 billion passwords
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A package containing about 10 billion stolen passwords from countless online services has been on sale online since July 4. According to the Internet NewsThis is the The largest set of leaked passwords in historySo far.

    The list called “RockYou2024” is on the hacker forum. 9,948,575,739 passwordswhich appears in plain text, without any kind of encryption. The huge file includes symbols used by Internet users from all over the world.

    There is a list of nearly 10 billion leaked passwords on the forum. "Obama Care"(Image: Cybernews/Reproduction)A list of nearly 10 billion leaked passwords found on the ObamaCare forum. (Image: Cybernews/Reproduction)source: Cyber ​​News / Cloning

    The package is believed to be an updated version of the “RockYou2021” program, which was leaked three years ago, and brought Over 8.4 billion stolen access credentialsThis in turn was an extension of the 2009 RockYou hack — hence the group's name — which exposed 32 million accounts.

    As a result, a package containing nearly 10 billion passwords for sale could be the result of work carried out over two decades. It is estimated to collect leaks from over 4,000 databases.according to the report.

    Should I be worried?

    Experts interviewed by the newspaper said the leaked list contained many corrupted passwords, and pieces of text collected from various sources that were not linked to usernames or profiles. In principle, this information should not be useful for hacking the account..

    However, the report highlights the potential for this data to be used in brute force attacks. The method consists of Test different combinations of passcodes and usernames for intrusion.Especially on systems that are not protected against this type of cyber attack.

    See also  Folding and sliding! Samsung's new display is everything and then some

    It is worth noting that there is no 100% effective way to protect credentials. But make sure to create strong and unique passwords for each account, enable two-step authentication and adopt a password manager. Help reduce the risk of improper access.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Osmond Blake

    "Web geek. Wannabe thinker. Reader. Freelance travel evangelist. Pop culture aficionado. Certified music scholar."

    Related Posts

    Lunarsaber Project: Solar-Powered Light Poles on the Moon.

    October 29, 2025

    The remote stars may not be exactly a star

    August 19, 2025

    “Sony started doing stupid things with Jim Ryan,” Michael Pashter says.

    August 18, 2025
    Leave A Reply Cancel Reply

    Navigate
    • Home
    • Top News
    • World
    • Economy
    • science
    • Technology
    • sport
    • entertainment
    • Contact Form
    Pages
    • About Us
    • Privacy Policy
    • DMCA
    • Editorial Policy
    • Contact Form
    MAIN MENU
    • Home
    • Top News
    • World
    • Economy
    • science
    • Technology
    • sport
    • entertainment
    • Contact Form
    Facebook X (Twitter) Instagram Pinterest
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.