Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

11/25/2014
12:20 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

6 Million+ Email Accounts Worldwide Exposed In Past 3 Months

Spike in number of stolen accounts likely due to uptick in major data breaches, researchers say.

More fallout from the epidemic of data breaches that occurred in 2014: More than 6 million email accounts and credentials from around the globe have been leaked in the past three months, according to a new study.

Putting that into perspective, the researchers who gathered that data from the cybercrime market say they typically see around 150,000 such pilfered accounts per month. "This explosion can only be connected to the high number of data breaches that occurred in 2014," Heimdal Security said in a blog post warning of the surge in stolen email account credentials.

The Danish security firm warns that the 6 million exposed email accounts represent just a snapshot of the compromised accounts, however.

"As a security company we only pick up a smaller part of what hackers actually have access to, and you have to remember that the 6 million accounts have only been discovered over the last three months. The actual number could be 20 times as high or more," says Morten Kjaersgaard, CEO of Heimdal Security. 

[This year's wave of cyber attacks was more dramatic in its widespread scope and seemingly constant battering of more than a dozen big-box chains. Check out our slideshow recapping them: The Year Of The Retailer Data Breach.]

Kjaersgaard told Dark Reading that the stolen email account information floating around the cyber underground either has already been or could be used by the bad guys to compromise businesses and individuals.

2014 indeed has been a watershed year for data breaches, mainly due to the wave of big-box retailers that were hacked for customer payment card information.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
12/1/2014 | 8:13:40 AM
Re: Just Another Day At the Office
It also doesn't surprise me that email is & will likely continuesto be a major target. It's such a ubiquitous application with a broad range of users (everyone?)...Like shooting phish in a barrel. (Pun intentded)
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
11/30/2014 | 9:07:30 PM
Re: Just Another Day At the Office
I'm not a betting person, but I'll bet there will be other such waves next year. 
Technocrati
50%
50%
Technocrati,
User Rank: Ninja
11/28/2014 | 1:55:12 PM
Just Another Day At the Office

"....They typically see around 150,000 such pilfered accounts per month. "This explosion can only be connected to the high number of data breaches that occurred in 2014. " 

 

Already an unbelievable number - I wonder what it be after the 2015 ?    If projections hold steady, 300,000 ? 

Technocrati
50%
50%
Technocrati,
User Rank: Ninja
11/28/2014 | 1:47:20 PM
Breeches: Too Many To Count

There have been so many security breeches of late that is getting difficult to keep up with them.  I have to ask myself, what is going on ?   There has to be a major flaw that hackers are exploiting and security personnel have yet to correct.   Always seems as if security is one to five steps behind the hacker.   

 

It might be time for companies to re-examine their security practices and policies - improvements must be made.

Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5230
PUBLISHED: 2019-11-13
P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform...
CVE-2019-5231
PUBLISHED: 2019-11-13
P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.186(C00E180R2P1) have an improper authorization vulnerability. The software incorrectly performs an authorization check when a user attempts to perform certain action. Successful exploit could allow the attacker to update a crafted package.
CVE-2019-5233
PUBLISHED: 2019-11-13
Huawei smartphones with versions earlier than Taurus-AL00B 10.0.0.41(SP2C00E41R3P2) have an improper authentication vulnerability. Successful exploitation may cause the attacker to access specific components.
CVE-2019-5246
PUBLISHED: 2019-11-13
Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain par...
CVE-2010-4177
PUBLISHED: 2019-11-12
mysql-gui-tools (mysql-query-browser and mysql-admin) before 5.0r14+openSUSE-2.3 exposes the password of a user connected to the MySQL server in clear text form via the list of running processes.