Security Top Tips - Why you shouldn't use BREACHED login info in your application

 


Sup guys! Although this matter has been highlighted soooo many times, but yet still billions of you peeps take it easy. So here we would like to highlight THIS once again...

"Always pick hard to guesss password & username for you online account!!"

especially never ever use any that has been listed on multiple data breaches since these billions of breaches logins will always being updated into thousands of botnet network that crawling the internet IP address for weak login page and run thousands of combination in a sec. Sooner or later you'll definitely got pwned! O'well, and the damage taken will depends on which groups who own the lucky bruteforce bot...

So check it out here before deciding the usernames & password for your next login:

https://haveibeenpwned.com/       and here too https://cybernews.com/personal-data-leak-check/


Breaches you were pwned in

A "breach" is an incident where data has been unintentionally exposed to the public. Using the 1Password password manager helps you ensure all your passwords are strong and unique such that a breach of one service doesn't put your other services at risk.


Adobe logo

Adobe: In October 2013, 153 million Adobe accounts were breached with each containing an internal ID, username, email, encrypted password and a password hint in plain text. The password cryptography was poorly done and many were quickly resolved back to plain text. The unencrypted hints also disclosed much about the passwords adding further to the risk that hundreds of millions of Adobe customers already faced.


Compromised data: Email addresses, Password hints, Passwords, Usernames


Cit0day logo

Cit0day (unverified): In November 2020, a collection of more than 23,000 allegedly breached websites known as Cit0day were made available for download on several hacking forums. The data consisted of 226M unique email address alongside password pairs, often represented as both password hashes and the cracked, plain text versions. Independent verification of the data established it contains many legitimate, previously undisclosed breaches. The data was provided to HIBP by dehashed.com.


Compromised data: Email addresses, Passwords


Nitro logo

Nitro: In September 2020, the Nitro PDF service suffered a massive data breach which exposed over 70 million unique email addresses. The breach also exposed names, bcrypt password hashes and the titles of converted documents. The data was provided to HIBP by dehashed.com.


Compromised data: Email addresses, Names, Passwords


Onliner Spambot logo

Onliner Spambot (spam list): In August 2017, a spambot by the name of Onliner Spambot was identified by security researcher Benkow moʞuƎq. The malicious software contained a server-based component located on an IP address in the Netherlands which exposed a large number of files containing personal information. In total, there were 711 million unique email addresses, many of which were also accompanied by corresponding passwords. A full write-up on what data was found is in the blog post titled Inside the Massive 711 Million Record Onliner Spambot Dump.


Compromised data: Email addresses, Passwords


Apollo logo

Apollo: In July 2018, the sales engagement startup Apollo left a database containing billions of data points publicly exposed without a password. The data was discovered by security researcher Vinny Troia who subsequently sent a subset of the data containing 126 million unique email addresses to Have I Been Pwned. The data left exposed by Apollo was used in their "revenue acceleration platform" and included personal information such as names and email addresses as well as professional information including places of employment, the roles people hold and where they're located. Apollo stressed that the exposed data did not include sensitive information such as passwords, social security numbers or financial data. The Apollo website has a contact form for those looking to get in touch with the organisation.


Compromised data: Email addresses, Employers, Geographic locations, Job titles, Names, Phone numbers, Salutations, Social media profiles


Stronghold Kingdoms logo

Stronghold Kingdoms: In July 2018, the massive multiplayer online game Stronghold Kingdoms suffered a data breach. Almost 5.2 million accounts were impacted by the incident which exposed emails addresses, usernames and passwords stored as salted SHA-1 hashes. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com".


Compromised data: Email addresses, Passwords, Usernames


Pastes you were found in

A paste is information that has been published to a publicly facing website designed to share content and is often an early indicator of a data breach. Pastes are automatically imported and often removed shortly after having been posted. Using the 1Password password manager helps you ensure all your passwords are strong and unique such that a breach of one service doesn't put your other services at risk.


Paste title Date Emails

No title 15 Mar 2018, 03:24 25