Sponsored By

As leaks go, it's a whopper, and a so-called email validation service provider is to blame.

Larry Loeb

April 1, 2019

3 Min Read

Huge amounts of leaked customer related data have been showing up all over the place.

First there were the Collection series, where something like 700 million identities were up for sale on a site on the dark web. But the latest in the series of leaking data may be the largest ever seen.

Bob Diachenko, a researcher at Security Discovery, found an unsecured MongoDB database belonging to a so-called email validation service provider, verifications.io. The database was totally unprotected, and was easily accessed by anyone.

The database is a collection of emails (808,539,939 in total) combined with additional information. The additional stuff includes phone numbers, dates of birth, physical addresses, gender, IP addresses and employer details.

In his blog, the researcher said that not all the emails contain personally identifiable information, but that a majority do.

DynaRisk also took a look at the database. They said that, "The original analysis (carried out by a number of other researchers) is correct and these sources appear to have analyzed the 'mainEmailDatabase' file that was leaked and found 808 million records. DynaRisk analyzed the three more databases from the same leak, namely 'EmailScrub, PyEmail, VerifiedEmails' which were to be found on the same server. […] Having now had a chance to clean all of the combined data, there are an additional 191 million bringing the total of email addresses to 982,864,972."

A billion email addresses. Just wow.

Diachenko then teamed up with Troy Hunt of Have I Been Pwned (HIBP) to see if the data was an entirely new unique set.

He concluded that this leak wasn't a aggregation of previous breaches, as has been the case with recent leaks reported by Hunt. Hunt has gone on to add the addresses to the HIBP data set.

Verifications.io seems to be just that, a way for spammers and other of their ilk to try out any lists of addresses they may have to see if they connect to anyone. In using a third party, the spammers will bypass any checkpoints that may built into the mail systems and not be identified by them.

The verifying service will have its own list of valid emails which may be cross-referenced against the spammer's list, and results given to the spammer. The service may try other means to assure validity, such as doing their own trial spamming.

When Diachenko tried to tell them about the database, he was told the data exposed was public data. He was then met with silence and finally the website for the company disappeared from the net. Sounds like a totes legit enterprise, right?

Adam Laub, SVP Product Management of Stealthbits Technologies, told Security Now that, "Given the frequency of data breach events and the quantity of information that is already available on the dark web and elsewhere for billions of people around the world, this really is nothing more than a reminder that your information is out there for those that want it for good or for bad.

"As we work towards making the keepers of our information more accountable for its security," he went on, "we need to acknowledge and remind ourselves that the security of our data and our identities is really on each of us individually. This is not a pessimistic viewpoint, but rather a realistic viewpoint based on the world we live in."

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Read more about:

Security Now

About the Author(s)

Larry Loeb

Blogger, Informationweek

Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek. He has written a book on the Secure Electronic Transaction Internet protocol. His latest book has the commercially obligatory title of Hack Proofing XML. He's been online since uucp "bang" addressing (where the world existed relative to !decvax), serving as editor of the Macintosh Exchange on BIX and the VARBusiness Exchange. His first Mac had 128 KB of memory, which was a big step up from his first 1130, which had 4 KB, as did his first 1401. You can e-mail him at [email protected].

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights