Search
Close this search box.
Search
Close this search box.

Report: Hacker Uploads 10 Billion Passwords to Dark Web Forum

Hacker Uploads 10 Billion Passwords Dark Web

In a significant cybersecurity breach, the world’s most extensive collection of stolen passwords has been uploaded to an infamous crime marketplace where cybercriminals trade such credentials.

The hacker, operating under the pseudonym ‘ObamaCare,’ has posted a database allegedly containing nearly 10 billion unique passwords, according to security researchers from Cybernews. This massive leak poses a substantial threat to online security worldwide.

The RockYou2024 Password Database

Security researchers have identified the RockYou2024 database as the most extensive collection of stolen and leaked credentials ever seen on the BreachForums criminal underground forum. 

Containing approximately 9,948,575,739 unique passwords, all in plaintext format, the RockYou2024 compilation includes entries from an earlier database known as RockYou2021.

The RockYou2021 database contained 8.4 billion passwords, to which about 1.5 billion new passwords have been added, covering 2021 through 2024. Researchers estimate that the latest credentials file contains entries from around 4,000 significant databases of stolen credentials spanning at least two decades.

Concerns About Data Integrity

Despite the vast volume of data in the RockYou2024 leak, some cybersecurity experts have raised concerns about the data’s integrity. Some researchers have suggested that much of the data might be useless to cybercriminals. 

Responding to these concerns, Cybernews stated that their researchers had verified around 30 GB of the data, finding a 100% match with part of the RockYou dataset. 

However, they did not thoroughly investigate all the datasets. Cybernews emphasised that their primary goal is to inform the public about potential risks rather than providing the dataset to threat actors.

Brute Force and Credential Stuffing Implications

Credential stuffing attacks remain among the most common and successful methods for gaining unauthorised access to services and systems. Cybernews researchers warn that attackers could exploit the RockYou2024 password compilation to conduct brute-force attacks. 

Such attacks could target various online accounts, internet-facing cameras, and even industrial hardware. Combined with other leaked databases containing email addresses and credentials, RockYou2024 could lead to data breaches, financial fraud, and identity thefts.

Expert Opinions on the Leak

Cybersecurity experts argue that the sheer size of the RockYou2024 database might limit its usefulness to cybercriminals. Daniel Card, a cybersecurity consultant, pointed out that once databases reach a specific size, adding more passwords does not significantly enhance threat actors’ capabilities. 

Ian Thornton-Trump, the chief security information officer at Cyjax, agreed, suggesting that the vast data size might render it next to useless. 

However, both experts stressed the importance of multi-factor authentication (MFA) in mitigating such risks. Thornton-Trump even suggested that regulation might be necessary to mandate MFA for all logins on software-as-a-service platforms.

Steps to Protect Yourself

Responding to this massive leak, cybersecurity experts advise individuals to reassess their attitudes towards login security. Jake Moore, the global cybersecurity advisor for ESET, emphasised the importance of using unique passwords for every account. 

Moore recommended using password managers to generate and store complex passwords securely. He also urged users to implement MFA wherever possible to add an extra layer of security. 

Additionally, Cybernews offers an exposed passwords checker tool, allowing users to verify if any of their passwords are included in the RockYou2024 database.

The RockYou2024 leak, containing nearly 10 billion unique passwords, represents a significant cybersecurity threat. While some experts question the data’s integrity, the potential for credential stuffing and brute-force attacks remains high. 

Cybersecurity experts recommend using unique passwords, employing password managers, and implementing multi-factor authentication to mitigate these risks. By taking these precautions, individuals can better protect themselves against the growing threat of data breaches and identity theft.

 

The information is taken from Forbes and First Post


Subscribe to Our Newsletter

Related Articles

Top Trending

Best Hosting Providers for Asian Businesses
7 Best Hosting Providers for Asian Businesses
Apple Blocks Fortnite on iOS
Fortnite Blocked on iOS in 2025 as Epic-Apple War Escalates
Israel Eases Gaza Blockade, Allows Limited Food
Israel Eases Gaza Blockade, Allows Limited Food After 10 Weeks
Capital One Completes $35B Discover Deal
Capital One Completes $35B Discover Deal, Becomes Card Giant
Jamal Roberts Wins American Idol Season 23
Jamal Roberts Wins American Idol Season 23 in Record-Breaking Finale

LIFESTYLE

Clean Beauty Movement
How the Clean Beauty Movement Is Transforming Skincare in 2025
Gender Reveal Balloons
The Ultimate Guide to Gender Reveal Balloons: Colors, Styles, and Surprises
Best Places to Shop in Manchester
Shop 'Til You Drop: The Best Places to Shop in Manchester for Every Style
retirement cities in California
10 Best Retirement Cities in California for a Relaxed and Affordable Life
Mother's Day Around The World
Mother’s Day Traditions Around the World: Mother's Day 2025 Special

Entertainment

Jamal Roberts Wins American Idol Season 23
Jamal Roberts Wins American Idol Season 23 in Record-Breaking Finale
Tom Cruise Final Reckoning
Tom Cruise Vows to Make Movies Into His 100s After Reckoning
cuba gooding jr net worth
Cuba Gooding Jr Net Worth: Photos and Videos Revealed
Taylor Swift Blake Lively Gigi Hadid Feud
Taylor Swift & Blake Lively Feud: Gigi Hadid Quietly Picks a Side
megan fox kids
Megan Fox Kids: A Closer Look At Noah, Bodhi, and Journey

GAMING

Apple Blocks Fortnite on iOS
Fortnite Blocked on iOS in 2025 as Epic-Apple War Escalates
Best Mobile Games for Commuting Without Internet
Best Mobile Games for Commuting Without Internet
Gaming Merch Brand
10 Steps to Launch a Successful Gaming Merch Brand in 2025
Best Games to Play With Only One Hand
Best Games to Play With Only One Hand in 2025 – Fun & Accessible Picks
Fortnite App Store Return
Apple Faces New Legal Push to Approve Fortnite on App Store

BUSINESS

Capital One Completes $35B Discover Deal
Capital One Completes $35B Discover Deal, Becomes Card Giant
high risk merchant account at highriskpay.com
Secure Your Business With A High Risk Merchant Account At HighRiskPay.com
Future of Tokenomics Innovations to Watch
7 Tokenomics Innovations Shaping the Future of Digital Assets
Web3 in Humanitarian Efforts
7 Ways Web3 Is Powering Modern Humanitarian Efforts
Multi-Signature Wallets Boost Web3 Security
Why Web3 Needs Multi-Signature Wallets for Safer Transactions?

TECHNOLOGY

Apple Blocks Fortnite on iOS
Fortnite Blocked on iOS in 2025 as Epic-Apple War Escalates
Fortnite App Store Return
Apple Faces New Legal Push to Approve Fortnite on App Store
Integrate Smart Technology into Modern Home Design
How to Integrate Smart Technology into Your Home’s Design
Enterprise GRC Solutions
What Capabilities Matter Most in Enterprise GRC Solutions?
Jaguar FK72-10E898-AG Sat Nav SD Card
Navigating the Jaguar FK72-10E898-AG Sat Nav SD Card for Europe, UK, and Ireland

HEALTH

Joe Biden Faces Aggressive Prostate Cancer
Joe Biden Faces Aggressive Prostate Cancer, Family Reviewing Care
Stroke Patient May Be Nearing the End of Life
Recognizing When a Stroke Patient May Be Nearing the End of Life
PSA Test
For Men: Is the PSA Test Still Necessary?
Cattle Joint Supplements
Top Cattle Joint Supplements: Boosting Your Herd’s Health and Performance
Molar Implant Healing Timeline
The Healing Timeline After Getting Molar Implants