Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

11/25/2014
12:20 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

6 Million+ Email Accounts Worldwide Exposed In Past 3 Months

Spike in number of stolen accounts likely due to uptick in major data breaches, researchers say.

More fallout from the epidemic of data breaches that occurred in 2014: More than 6 million email accounts and credentials from around the globe have been leaked in the past three months, according to a new study.

Putting that into perspective, the researchers who gathered that data from the cybercrime market say they typically see around 150,000 such pilfered accounts per month. "This explosion can only be connected to the high number of data breaches that occurred in 2014," Heimdal Security said in a blog post warning of the surge in stolen email account credentials.

The Danish security firm warns that the 6 million exposed email accounts represent just a snapshot of the compromised accounts, however.

"As a security company we only pick up a smaller part of what hackers actually have access to, and you have to remember that the 6 million accounts have only been discovered over the last three months. The actual number could be 20 times as high or more," says Morten Kjaersgaard, CEO of Heimdal Security. 

[This year's wave of cyber attacks was more dramatic in its widespread scope and seemingly constant battering of more than a dozen big-box chains. Check out our slideshow recapping them: The Year Of The Retailer Data Breach.]

Kjaersgaard told Dark Reading that the stolen email account information floating around the cyber underground either has already been or could be used by the bad guys to compromise businesses and individuals.

2014 indeed has been a watershed year for data breaches, mainly due to the wave of big-box retailers that were hacked for customer payment card information.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
12/1/2014 | 8:13:40 AM
Re: Just Another Day At the Office
It also doesn't surprise me that email is & will likely continuesto be a major target. It's such a ubiquitous application with a broad range of users (everyone?)...Like shooting phish in a barrel. (Pun intentded)
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
11/30/2014 | 9:07:30 PM
Re: Just Another Day At the Office
I'm not a betting person, but I'll bet there will be other such waves next year. 
Technocrati
50%
50%
Technocrati,
User Rank: Ninja
11/28/2014 | 1:55:12 PM
Just Another Day At the Office

"....They typically see around 150,000 such pilfered accounts per month. "This explosion can only be connected to the high number of data breaches that occurred in 2014. " 

 

Already an unbelievable number - I wonder what it be after the 2015 ?    If projections hold steady, 300,000 ? 

Technocrati
50%
50%
Technocrati,
User Rank: Ninja
11/28/2014 | 1:47:20 PM
Breeches: Too Many To Count

There have been so many security breeches of late that is getting difficult to keep up with them.  I have to ask myself, what is going on ?   There has to be a major flaw that hackers are exploiting and security personnel have yet to correct.   Always seems as if security is one to five steps behind the hacker.   

 

It might be time for companies to re-examine their security practices and policies - improvements must be made.

COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17505
PUBLISHED: 2020-08-12
Artica Web Proxy 4.30.000000 allows an authenticated remote attacker to inject commands via the service-cmds parameter in cyrus.php. These commands are executed with root privileges via service_cmds_peform.
CVE-2020-17506
PUBLISHED: 2020-08-12
Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php.
CVE-2020-2035
PUBLISHED: 2020-08-12
When SSL/TLS Forward Proxy Decryption mode has been configured to decrypt the web transactions, the PAN-OS URL filtering feature inspects the HTTP Host and URL path headers for policy enforcement on the decrypted HTTPS web transactions but does not consider Server Name Indication (SNI) field within ...
CVE-2020-5415
PUBLISHED: 2020-08-12
Concourse, versions prior to 6.3.1 and 6.4.1, in installations which use the GitLab auth connector, is vulnerable to identity spoofing by way of configuring a GitLab account with the same full name as another user who is granted access to a Concourse team. GitLab groups do not have this vulnerabilit...
CVE-2020-6653
PUBLISHED: 2020-08-12
Eaton's Secure connect mobile app v1.7.3 & prior stores the user login credentials in logcat file when user create or register the account on the Mobile app. A malicious app or unauthorized user can harvest the information and later on can use the information to monitor and control the user's ac...