Search
Close this search box.
Search
Close this search box.

Report: Hacker Uploads 10 Billion Passwords to Dark Web Forum

Hacker Uploads 10 Billion Passwords Dark Web

In a significant cybersecurity breach, the world’s most extensive collection of stolen passwords has been uploaded to an infamous crime marketplace where cybercriminals trade such credentials.

The hacker, operating under the pseudonym ‘ObamaCare,’ has posted a database allegedly containing nearly 10 billion unique passwords, according to security researchers from Cybernews. This massive leak poses a substantial threat to online security worldwide.

The RockYou2024 Password Database

Security researchers have identified the RockYou2024 database as the most extensive collection of stolen and leaked credentials ever seen on the BreachForums criminal underground forum. 

Containing approximately 9,948,575,739 unique passwords, all in plaintext format, the RockYou2024 compilation includes entries from an earlier database known as RockYou2021.

The RockYou2021 database contained 8.4 billion passwords, to which about 1.5 billion new passwords have been added, covering 2021 through 2024. Researchers estimate that the latest credentials file contains entries from around 4,000 significant databases of stolen credentials spanning at least two decades.

Concerns About Data Integrity

Despite the vast volume of data in the RockYou2024 leak, some cybersecurity experts have raised concerns about the data’s integrity. Some researchers have suggested that much of the data might be useless to cybercriminals. 

Responding to these concerns, Cybernews stated that their researchers had verified around 30 GB of the data, finding a 100% match with part of the RockYou dataset. 

However, they did not thoroughly investigate all the datasets. Cybernews emphasised that their primary goal is to inform the public about potential risks rather than providing the dataset to threat actors.

Brute Force and Credential Stuffing Implications

Credential stuffing attacks remain among the most common and successful methods for gaining unauthorised access to services and systems. Cybernews researchers warn that attackers could exploit the RockYou2024 password compilation to conduct brute-force attacks. 

Such attacks could target various online accounts, internet-facing cameras, and even industrial hardware. Combined with other leaked databases containing email addresses and credentials, RockYou2024 could lead to data breaches, financial fraud, and identity thefts.

Expert Opinions on the Leak

Cybersecurity experts argue that the sheer size of the RockYou2024 database might limit its usefulness to cybercriminals. Daniel Card, a cybersecurity consultant, pointed out that once databases reach a specific size, adding more passwords does not significantly enhance threat actors’ capabilities. 

Ian Thornton-Trump, the chief security information officer at Cyjax, agreed, suggesting that the vast data size might render it next to useless. 

However, both experts stressed the importance of multi-factor authentication (MFA) in mitigating such risks. Thornton-Trump even suggested that regulation might be necessary to mandate MFA for all logins on software-as-a-service platforms.

Steps to Protect Yourself

Responding to this massive leak, cybersecurity experts advise individuals to reassess their attitudes towards login security. Jake Moore, the global cybersecurity advisor for ESET, emphasised the importance of using unique passwords for every account. 

Moore recommended using password managers to generate and store complex passwords securely. He also urged users to implement MFA wherever possible to add an extra layer of security. 

Additionally, Cybernews offers an exposed passwords checker tool, allowing users to verify if any of their passwords are included in the RockYou2024 database.

The RockYou2024 leak, containing nearly 10 billion unique passwords, represents a significant cybersecurity threat. While some experts question the data’s integrity, the potential for credential stuffing and brute-force attacks remains high. 

Cybersecurity experts recommend using unique passwords, employing password managers, and implementing multi-factor authentication to mitigate these risks. By taking these precautions, individuals can better protect themselves against the growing threat of data breaches and identity theft.

 

The information is taken from Forbes and First Post


Subscribe to Our Newsletter

Related Articles

Top Trending

Who is Claressa Shields' Mother
Who is Claressa Shields' Mother: The Untold Story of Her Family and Struggles
rihanna hinted pregnancy before met gala
Rihanna Hinted at Pregnancy Before Met Gala, Says Anna Wintour
bill gates accuses elon musk of harming poor children
Bill Gates Blames Elon Musk for Harming World's Poorest Children
india neutralizes pakistani drone attacks
India Neutralizes Pakistani Drone Strikes Amid Rising Clashes
Jules Ari
Jules Ari Age, Height, Relationship, Family, Biography, and Net Worth

LIFESTYLE

summer birthday party ideas
Creative Summer Birthday Party Ideas for Kids in 2025
May 6 Zodiac
May 6 Zodiac: Positive Traits, Compatibility and More about Taurus
self storage solutions for life transitions
How Self Storage Can Help During Major Life Changes (Divorce, Moving, etc.)?
why is my poinsettia dying
Why Is My Poinsettia Dying? Tips To Revive Your Wilting Poinsettia Plant
crypto retirement plan strategies
7 Ways Crypto Can Reshape Your Retirement Plan for the Future

Entertainment

rihanna hinted pregnancy before met gala
Rihanna Hinted at Pregnancy Before Met Gala, Says Anna Wintour
Jules Ari
Jules Ari Age, Height, Relationship, Family, Biography, and Net Worth
rocket league unblocked
Rocket League Unblocked: Soccer And Vehicular Mayhem Online Game
smokey robinson sexual assault allegations
Smokey Robinson Faces Sexual Assault Allegations by 4 Women
Disneyland Abu Dhabi
Disneyland Abu Dhabi: First Disney Theme Park in Middle East

GAMING

Best Mobile Horror Games
The Best Mobile Horror Games That Will Keep You Up at Night
Evolution of Video Game Graphics
The Evolution of Video Game Graphics: 1980s to 2025
Best Workouts Inspired by Video Games
Level Up Your Fitness: Best Video Game-Inspired Workouts
rocket league unblocked
Rocket League Unblocked: Soccer And Vehicular Mayhem Online Game
Maksym Krippa GSC Game World
S.T.A.L.K.E.R. Reimagined: How Maksym Krippa’s Entry Reshaped GSC Game World in 2023

BUSINESS

Business Behind Game Localization
The Business Behind Game Localization: How It Works
International Employment Agencies
How international employment agencies can help you find talent in hard-to-reach markets?
Transition Your Business to Web3
How to Transition Your Business to Web3 Successfully
How to Calculate Quarterly Tax Payments
How to Calculate Quarterly Tax Payments in 5 Easy Steps
credit suisse tax evasion
Credit Suisse Fined $511M for U.S. Offshore Tax Evasion Scheme

TECHNOLOGY

bill gates accuses elon musk of harming poor children
Bill Gates Blames Elon Musk for Harming World's Poorest Children
Maksym Krippa GSC Game World
S.T.A.L.K.E.R. Reimagined: How Maksym Krippa’s Entry Reshaped GSC Game World in 2023
Strengthening Cybersecurity with Security Operations
Strengthening Cybersecurity with Security Operations, CWPP, and Product Security
pitch a game idea
How to Pitch a Game Idea to a Developer or Publisher?
Web3 impact on virtual reality experiences
How Web3 Is Redefining Virtual Reality and Immersive Experiences?

HEALTH

Yimusanfendi
7 Incredible Benefits of Yimusanfendi Meditation and Possible Side Effects
Connection Between Hydration and Urinary Health
The Connection Between Hydration and Urinary Health
Neuralink Brain Implant Patient Regains Speech
Neuralink Brain Implant Helps ALS Patient Regain Speech with AI Support
Wegovy for Weight Loss
Wegovy for Weight Loss: Is It Worth Buying Online?
Role of Sperm DNA Fragmentation Testing in IVF
The Role of Sperm DNA Fragmentation Testing in IVF with ICSI Success