Report: Hacker Uploads 10 Billion Passwords to Dark Web Forum

Hacker Uploads 10 Billion Passwords Dark Web

In a significant cybersecurity breach, the world’s most extensive collection of stolen passwords has been uploaded to an infamous crime marketplace where cybercriminals trade such credentials.

The hacker, operating under the pseudonym ‘ObamaCare,’ has posted a database allegedly containing nearly 10 billion unique passwords, according to security researchers from Cybernews. This massive leak poses a substantial threat to online security worldwide.

The RockYou2024 Password Database

Security researchers have identified the RockYou2024 database as the most extensive collection of stolen and leaked credentials ever seen on the BreachForums criminal underground forum. 

Containing approximately 9,948,575,739 unique passwords, all in plaintext format, the RockYou2024 compilation includes entries from an earlier database known as RockYou2021.

The RockYou2021 database contained 8.4 billion passwords, to which about 1.5 billion new passwords have been added, covering 2021 through 2024. Researchers estimate that the latest credentials file contains entries from around 4,000 significant databases of stolen credentials spanning at least two decades.

Concerns About Data Integrity

Despite the vast volume of data in the RockYou2024 leak, some cybersecurity experts have raised concerns about the data’s integrity. Some researchers have suggested that much of the data might be useless to cybercriminals. 

Responding to these concerns, Cybernews stated that their researchers had verified around 30 GB of the data, finding a 100% match with part of the RockYou dataset. 

However, they did not thoroughly investigate all the datasets. Cybernews emphasised that their primary goal is to inform the public about potential risks rather than providing the dataset to threat actors.

Brute Force and Credential Stuffing Implications

Credential stuffing attacks remain among the most common and successful methods for gaining unauthorised access to services and systems. Cybernews researchers warn that attackers could exploit the RockYou2024 password compilation to conduct brute-force attacks. 

Such attacks could target various online accounts, internet-facing cameras, and even industrial hardware. Combined with other leaked databases containing email addresses and credentials, RockYou2024 could lead to data breaches, financial fraud, and identity thefts.

Expert Opinions on the Leak

Cybersecurity experts argue that the sheer size of the RockYou2024 database might limit its usefulness to cybercriminals. Daniel Card, a cybersecurity consultant, pointed out that once databases reach a specific size, adding more passwords does not significantly enhance threat actors’ capabilities. 

Ian Thornton-Trump, the chief security information officer at Cyjax, agreed, suggesting that the vast data size might render it next to useless. 

However, both experts stressed the importance of multi-factor authentication (MFA) in mitigating such risks. Thornton-Trump even suggested that regulation might be necessary to mandate MFA for all logins on software-as-a-service platforms.

Steps to Protect Yourself

Responding to this massive leak, cybersecurity experts advise individuals to reassess their attitudes towards login security. Jake Moore, the global cybersecurity advisor for ESET, emphasised the importance of using unique passwords for every account. 

Moore recommended using password managers to generate and store complex passwords securely. He also urged users to implement MFA wherever possible to add an extra layer of security. 

Additionally, Cybernews offers an exposed passwords checker tool, allowing users to verify if any of their passwords are included in the RockYou2024 database.

The RockYou2024 leak, containing nearly 10 billion unique passwords, represents a significant cybersecurity threat. While some experts question the data’s integrity, the potential for credential stuffing and brute-force attacks remains high. 

Cybersecurity experts recommend using unique passwords, employing password managers, and implementing multi-factor authentication to mitigate these risks. By taking these precautions, individuals can better protect themselves against the growing threat of data breaches and identity theft.

 

The information is taken from Forbes and First Post


Subscribe to Our Newsletter

Related Articles

Top Trending

How Cloud Gaming Is Changing Mobile Experiences
How Cloud Gaming Is Changing Mobile Experiences
Digital Fitness Apps in Germany
Digital Fitness Apps in Germany: 15 Startups Turning Phones Into Personal Trainers 
How to Use a Balance Transfer to Pay Off Debt Faster
Pay Off Debt Faster with a Smart Balance Transfer
GDPR compliant web design
15 Practical Tips for GDPR-Compliant Web Design
Solar Panels Increase Home Resale Value
How Solar Panels Affect Your Home's Resale Value

Fintech & Finance

How to Use a Balance Transfer to Pay Off Debt Faster
Pay Off Debt Faster with a Smart Balance Transfer
Best High-Yield Savings Accounts Now
Best High-Yield Savings Accounts Of 2026
Best Australian Credit Cards 2026
8 Best Australian Credit Cards for Points and Cashback in 2026
Klarna global expansion
12 Key Facts About Klarna's Global Expansion
The Best Business Credit Cards for Entrepreneurs
The Best Business Credit Cards for Entrepreneurs

Sustainability & Living

Solar Panels Increase Home Resale Value
How Solar Panels Affect Your Home's Resale Value
Solar vs Coal
How Solar Energy Is Becoming Cheaper Than Coal
UK Blockchain Food Traceability Startups
12 UK Blockchain Solutions Ensuring Complete Farm-to-Fork Traceability
EV Adoption in Australia
13 Critical Facts About EV Adoption in Australia
Non-Toxic Home Finishes UK
10 UK Startups Revolutionizing Home Renovations with Non-Toxic Finishes

GAMING

How Cloud Gaming Is Changing Mobile Experiences
How Cloud Gaming Is Changing Mobile Experiences
The Rise of Hyper-Casual Games What's Driving Downloads
Hyper-Casual Games Growth: Key Drivers Behind Massive Downloads
M&A in Gaming
Top 10 SMEs Specializing in M&A in Gaming in USA
Top 10 SMEs Specializing in Game Engines
Top 10 SMEs Specializing in Game Engines in the United States of America
Gaming Audio Design & Music
Top 10 SMEs Specializing in Gaming Audio Design & Music in US

Business & Marketing

Investing in Nordic stock exchanges
10 Practical Tips for Investing in Nordic Stock Exchanges
Best High-Yield Savings Accounts Now
Best High-Yield Savings Accounts Of 2026
How To Conduct Performance Reviews That Actually Motivate
How To Conduct Performance Reviews That Actually Motivate
Why American Football Still Dominates Sports Culture Across The United States
Why American Football Still Dominates Sports Culture Across The United States
How To Run Effective Team Meetings That Don't Waste Time
How To Run Effective Team Meetings That Don't Waste Time: Maximize Your Productivity!

Technology & AI

GDPR compliant web design
15 Practical Tips for GDPR-Compliant Web Design
How to Build a Scalable App Architecture from Day One
Scalable App Architecture Strategies for Modern Startups
Why Most SaaS Startups Have a Strategy Gap and the Tools Closing It
Why Most SaaS Startups Have a Strategy Gap — and the Tools Closing It
Aya vs Google Translate
Aya vs Google Translate in 2026: Which AI Actually Understands Your Language
Mobile Game Psychology: How Developers Hook Players Fast
How Mobile Game Developers Hook Players With Psychology

Fitness & Wellness

Digital Fitness Apps in Germany
Digital Fitness Apps in Germany: 15 Startups Turning Phones Into Personal Trainers 
modern therapy misconceptions
Why Therapy Is Still Misunderstood And How To Find The Right Help
Physical Symptoms of Grieving: How It Works
Physical Symptoms of Grieving: How It Works And Why There's No Shortcut Through It
Gamified Fitness Startups in UK
15 UK’s Most Influential Gamified Fitness Startups and SMEs 
Mindful Handwriting
Ink Against the Algorithm: Why Writing by Hand Is the New Wellness Tech