Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security //

Data Leakage

1/17/2019
03:26 PM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

'Collection #1' Repository Totals 87GB of Stolen Email Addresses & Passwords

With the discovery of 'Collection #1,' security researcher Troy Hunt appears to have found the largest repository of stolen email addresses and passwords ever, totaling more than 87GB and 12,000 separate files.

There are massive data breaches and then there is "Collection #1."

On January 17, security researcher Troy Hunt, who runs the popular Have I Been Pwned website, detailed the discovery of 12,000 separate files that held more than 87GB of stolen personal data, which he dubbed Collection #1. The name comes from a root folder where the data had been stored.

These thousands of files, which were found on the New Zealand-based MEGA cloud hosting service, contained 772,904,991 unique email addresses, along with 21,222,975 passwords. If all the numbers pan out -- there are 1,160,253,228 unique combinations all together -- this is the largest collection of stolen personal data ever found.

"What I can say is that my own personal data is in there and it's accurate; right email address and a password I used many years ago," Hunt wrote in Thursday's blog post. "Like many of you reading this, I've been in multiple data breaches before which have resulted in my email addresses and yes, my passwords, circulating in public."

A list of stolen passwords from a hacking forum\r\n(Source: Troy Hunt)\r\n
A list of stolen passwords from a hacking forum
\r\n(Source: Troy Hunt)\r\n

Hunt noted much of the data was found on a hacking forum, where it was being socialized. Many of the passwords had been de-encrypted and converted to plain text.

It appears all this data was being used, or could be used, for credential stuffing attacks, a brute-force method used to guess passwords and further hijack other accounts using this personal information.

The discovery of this repository of stolen data is likely to respark debates about how passwords are used, how often users should change them and if there's any point anymore in using passwords to keep data secure. (See Microsoft Looks to End the Era of Security Passwords.)

Terence Jackson, CISO of Thycotic, a security vendor that provides privileged access management (PAM) tools, noted in an email that both individual consumers, as well as enterprises, should take notice of Collection #1 since so many people repeatedly re-use passwords.

"This highlights the importance of password management and consumer education in that regard," Jackson told Security Now. He added:

Many people still use the same passwords across sites for personal and business purposes because it's convenient until something like this happens and it's back in the headlines. Using unique passwords on each site isn't a magic bullet, but the goal here is to limit the damage that could be done in a credential stuffing or brute force type attack. As a CISO, this type of attack would concern me because employees often use their corporate emails to sign up for services and often use the same passwords.

Although the data has been removed from MEGA, combinations of passwords and email addresses can still be in someone else's hands. Hunt's site offers services where users can check to see if their passwords have been exposed.

In an email, Raj Samani, chief scientist at McAfee, urged anyone who thinks their email address or password may have been compromised to reset passwords and to look into using a password manager.

"People need to act fast and defend themselves," Samani wrote. "With such a high volume of personal data being discovered, nobody can assume they haven’t been caught up in this. Passwords need to be changed immediately. If you have the same password across any account, device or app you need to make every single one unique, strong and never re-use it again. A password manager is a great option if you want to do this quickly."

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20663
PUBLISHED: 2021-03-05
Cross-site scripting vulnerability in in Role authority setting screen of Movable Type 7 r.4705 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4705 and earlier (Movable Type Advanced 7 Series), Movable Type 6.7.5 and earlier (Movable Type 6.7 Series), Movable Type Premium 1.39 and ea...
CVE-2021-20664
PUBLISHED: 2021-03-05
Cross-site scripting vulnerability in in Asset registration screen of Movable Type 7 r.4705 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4705 and earlier (Movable Type Advanced 7 Series), Movable Type 6.7.5 and earlier (Movable Type 6.7 Series), Movable Type Premium 1.39 and earlie...
CVE-2021-20665
PUBLISHED: 2021-03-05
Cross-site scripting vulnerability in in Add asset screen of Contents field of Movable Type 7 r.4705 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4705 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.39 and earlier, and Movable Type Premium Advanced 1.39 and ear...
CVE-2021-28031
PUBLISHED: 2021-03-05
An issue was discovered in the scratchpad crate before 1.3.1 for Rust. The move_elements function can have a double-free upon a panic in a user-provided f function.
CVE-2021-28032
PUBLISHED: 2021-03-05
An issue was discovered in the nano_arena crate before 0.5.2 for Rust. There is an aliasing violation in split_at because two mutable references can exist for the same element, if Borrow<Idx> behaves in certain ways. This can have a resultant out-of-bounds write or use-after-free.