Report: Hacker Uploads 10 Billion Passwords to Dark Web Forum

Hacker Uploads 10 Billion Passwords Dark Web

In a significant cybersecurity breach, the world’s most extensive collection of stolen passwords has been uploaded to an infamous crime marketplace where cybercriminals trade such credentials.

The hacker, operating under the pseudonym ‘ObamaCare,’ has posted a database allegedly containing nearly 10 billion unique passwords, according to security researchers from Cybernews. This massive leak poses a substantial threat to online security worldwide.

The RockYou2024 Password Database

Security researchers have identified the RockYou2024 database as the most extensive collection of stolen and leaked credentials ever seen on the BreachForums criminal underground forum. 

Containing approximately 9,948,575,739 unique passwords, all in plaintext format, the RockYou2024 compilation includes entries from an earlier database known as RockYou2021.

The RockYou2021 database contained 8.4 billion passwords, to which about 1.5 billion new passwords have been added, covering 2021 through 2024. Researchers estimate that the latest credentials file contains entries from around 4,000 significant databases of stolen credentials spanning at least two decades.

Concerns About Data Integrity

Despite the vast volume of data in the RockYou2024 leak, some cybersecurity experts have raised concerns about the data’s integrity. Some researchers have suggested that much of the data might be useless to cybercriminals. 

Responding to these concerns, Cybernews stated that their researchers had verified around 30 GB of the data, finding a 100% match with part of the RockYou dataset. 

However, they did not thoroughly investigate all the datasets. Cybernews emphasised that their primary goal is to inform the public about potential risks rather than providing the dataset to threat actors.

Brute Force and Credential Stuffing Implications

Credential stuffing attacks remain among the most common and successful methods for gaining unauthorised access to services and systems. Cybernews researchers warn that attackers could exploit the RockYou2024 password compilation to conduct brute-force attacks. 

Such attacks could target various online accounts, internet-facing cameras, and even industrial hardware. Combined with other leaked databases containing email addresses and credentials, RockYou2024 could lead to data breaches, financial fraud, and identity thefts.

Expert Opinions on the Leak

Cybersecurity experts argue that the sheer size of the RockYou2024 database might limit its usefulness to cybercriminals. Daniel Card, a cybersecurity consultant, pointed out that once databases reach a specific size, adding more passwords does not significantly enhance threat actors’ capabilities. 

Ian Thornton-Trump, the chief security information officer at Cyjax, agreed, suggesting that the vast data size might render it next to useless. 

However, both experts stressed the importance of multi-factor authentication (MFA) in mitigating such risks. Thornton-Trump even suggested that regulation might be necessary to mandate MFA for all logins on software-as-a-service platforms.

Steps to Protect Yourself

Responding to this massive leak, cybersecurity experts advise individuals to reassess their attitudes towards login security. Jake Moore, the global cybersecurity advisor for ESET, emphasised the importance of using unique passwords for every account. 

Moore recommended using password managers to generate and store complex passwords securely. He also urged users to implement MFA wherever possible to add an extra layer of security. 

Additionally, Cybernews offers an exposed passwords checker tool, allowing users to verify if any of their passwords are included in the RockYou2024 database.

The RockYou2024 leak, containing nearly 10 billion unique passwords, represents a significant cybersecurity threat. While some experts question the data’s integrity, the potential for credential stuffing and brute-force attacks remains high. 

Cybersecurity experts recommend using unique passwords, employing password managers, and implementing multi-factor authentication to mitigate these risks. By taking these precautions, individuals can better protect themselves against the growing threat of data breaches and identity theft.

 

The information is taken from Forbes and First Post


Subscribe to Our Newsletter

Related Articles

Top Trending

The Shift from Co-Pilot to Autopilot The Rise of Agentic SaaS
The Shift from "Co-Pilot" to "Autopilot": The Rise of Agentic SaaS
Polylaminin Breakthrough
Polylaminin Breakthrough: Can This Brazilian Discovery Finally Reverse Spinal Cord Injury?
Windows on Arm- The 2026 Shift in Laptop Architecture
Windows on Arm: The 2026 Shift in Laptop Architecture
LG CLOiD Home Robot Price
CES 2026: LG’s “Zero-Labor” AI Agent Robot Finally Has a Price Tag
Nvidia Thor Chip vs Tesla FSD
Nvidia’s “Thor” Chip vs. Tesla FSD: Jensen Huang Calls Musk’s Tech “World-Class”

LIFESTYLE

Travel Sustainably Without Spending Extra featured image
How Can You Travel Sustainably Without Spending Extra? Save On Your Next Trip!
Benefits of Living in an Eco-Friendly Community featured image
Go Green Together: 12 Benefits of Living in an Eco-Friendly Community!
Happy new year 2026 global celebration
Happy New Year 2026: Celebrate Around the World With Global Traditions
dubai beach day itinerary
From Sunrise Yoga to Sunset Cocktails: The Perfect Beach Day Itinerary – Your Step-by-Step Guide to a Day by the Water
Ford F-150 Vs Ram 1500 Vs Chevy Silverado
The "Big 3" Battle: 10 Key Differences Between the Ford F-150, Ram 1500, and Chevy Silverado

Entertainment

Samsung’s 130-Inch Micro RGB TV The Wall Comes Home
Samsung’s 130-Inch Micro RGB TV: The "Wall" Comes Home
MrBeast Copyright Gambit
Beyond The Paywall: The MrBeast Copyright Gambit And The New Rules Of Co-Streaming Ownership
Stranger Things Finale Crashes Netflix
Stranger Things Finale Draws 137M Views, Crashes Netflix
Demon Slayer Infinity Castle Part 2 release date
Demon Slayer Infinity Castle Part 2 Release Date: Crunchyroll Denies Sequel Timing Rumors
BTS New Album 20 March 2026
BTS to Release New Album March 20, 2026

GAMING

Styx Blades of Greed
The Goblin Goes Open World: How Styx: Blades of Greed is Reinventing the AA Stealth Genre.
Resident Evil Requiem Switch 2
Resident Evil Requiem: First Look at "Open City" Gameplay on Switch 2
High-performance gaming setup with clear monitor display and low-latency peripherals. n Improve Your Gaming Performance Instantly
Improve Your Gaming Performance Instantly: 10 Fast Fixes That Actually Work
Learning Games for Toddlers
Learning Games For Toddlers: Top 10 Ad-Free Educational Games For 2026
Gamification In Education
Screen Time That Counts: Why Gamification Is the Future of Learning

BUSINESS

IMF 2026 Outlook Stable But Fragile
Global Economic Outlook: IMF Predicts 3.1% Growth but "Downside Risks" Remain
India Rice Exports
India’s Rice Dominance: How Strategic Export Shifts are Reshaping South Asian Trade in 2026
Mistakes to Avoid When Seeking Small Business Funding featured image
15 Mistakes to Avoid As New Entrepreneurs When Seeking Small Business Funding
Global stock markets break record highs featured image
Global Stock Markets Surge to Record Highs Across Continents: What’s Powering the Rally—and What Could Break It
Embodied Intelligence
Beyond Screen-Bound AI: How Embodied Intelligence is Reshaping Industrial Logistics in 2026

TECHNOLOGY

The Shift from Co-Pilot to Autopilot The Rise of Agentic SaaS
The Shift from "Co-Pilot" to "Autopilot": The Rise of Agentic SaaS
Windows on Arm- The 2026 Shift in Laptop Architecture
Windows on Arm: The 2026 Shift in Laptop Architecture
LG CLOiD Home Robot Price
CES 2026: LG’s “Zero-Labor” AI Agent Robot Finally Has a Price Tag
Nvidia Thor Chip vs Tesla FSD
Nvidia’s “Thor” Chip vs. Tesla FSD: Jensen Huang Calls Musk’s Tech “World-Class”
Meta vs. The World- The Smart Glasses War Heats Up at CES
Meta vs The World: The Smart Glasses War Heats Up at CES

HEALTH

Polylaminin Breakthrough
Polylaminin Breakthrough: Can This Brazilian Discovery Finally Reverse Spinal Cord Injury?
Bio Wearables For Stress
Post-Holiday Wellness: The Rise of "Bio-Wearables" for Stress
ChatGPT Health Medical Records
Beyond the Chatbot: Why OpenAI’s Entry into Medical Records is the Ultimate Test of Public Trust in the AI Era
A health worker registers an elderly patient using a laptop at a rural health clinic in Africa
Digital Health Sovereignty: The 2026 Push for National Digital Health Records in Rural Economies
Digital Detox for Kids
Digital Detox for Kids: Balancing Online Play With Outdoor Fun [2026 Guide]