Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

This might be the mother of all password leaks, with billions of credentials exposed
BGR ^ | 7 Jun 2021 | Andy Meek

Posted on 06/09/2021 6:47:55 AM PDT by ken in texas

Shortly before Apple CEO Tim Cook took the virtual stage at the iPhone maker’s Apple Park headquarters campus for WWDC 2021 on Monday — at which the company unveiled a ton of new software updates, including some major new privacy enhancements — an email landed in my inbox underscoring how critical those privacy features are going to be once they roll out with iOS 15. Basically, there’s been another huge data leak, this time exposing several billion passwords in what just might be the biggest dump of passwords online ever.

This news comes via the team at CyberNews, which reports that a 100GB text file containing a staggering 8.4 billion password entries was just leaked on a popular hacker forum. This data set presumably combines passwords stolen via previous data breaches and leaks, and it’s been dubbed the “RockYou2020” password leak on that hacker forum. That name was apparently chosen, per CyberNews, as a nod to the RockYou data breach from back in 2009, “when threat actors hacked their way into the social app website’s servers and got their hands on more than 32 million user passwords stored in plain text.”

--- end excerpt ---

(Excerpt) Read more at bgr.com ...


TOPICS: Computers/Internet
KEYWORDS: dataleak; password; rockyou2020; rockyou2021; security; windowspinglist
Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-110 next last
To: cymbeline

Spoof the email address, doesn’t matter. The token gets formed using hashed information that identifies your machine (there’s various unique parts to every computer) so even within your own house a token you make on 1 machine couldn’t be transferred to another. Login to the same place that uses tokens on both they will both need and use their own token. It’s probably possible to find a way to spoof those unique things into the token, but it’s hard, again only good for an hour, then the token expires.


81 posted on 06/09/2021 12:59:41 PM PDT by discostu (Like a dog being shown a card trick )
[ Post Reply | Private Reply | To 77 | View Replies]

To: discostu

There are a lot of options out in the wild, and with cookies becoming true bete noirs, most platforms are switching to some type of proper tokenization to allow for persistence. Microsoft’s PRT (Primary Refresh Token) shows promise, but every tokenization scheme has its pros and cons.


82 posted on 06/09/2021 1:00:17 PM PDT by rarestia (Repeal the 17th Amendment and ratify Article the First to give the power back to the people!)
[ Post Reply | Private Reply | To 80 | View Replies]

To: arthurus

That is an excellent suggestion.


83 posted on 06/09/2021 1:11:34 PM PDT by Dacula
[ Post Reply | Private Reply | To 72 | View Replies]

To: Gay State Conservative

I use: 123Password456


84 posted on 06/09/2021 1:12:51 PM PDT by Carriage Hill (A society grows great when old men plant trees, in whose shade they know they will never sit..)
[ Post Reply | Private Reply | To 15 | View Replies]

To: carriage_hill

Good to know!


85 posted on 06/09/2021 1:13:38 PM PDT by MayflowerMadam (Faith, not fear. Faith, not faintheartedness.)
[ Post Reply | Private Reply | To 84 | View Replies]

To: zeugma

Yes, REXX was a boon. I used to to automate entire design data
manufacture and release processes at IBM, reducing design data
assembly, packaging and delivery to hours or minutes, instead of days or weeks.

The intelligent and intuitive OS/2 desktop is another part I expect not to be equaled in my lifetime. (The Workplace shell)
Those icons seemed self aware and spooky smart at the time…. ;-)

~Easy


86 posted on 06/09/2021 1:25:01 PM PDT by EasySt (Say not this is the truth, but so it seems to me to be, as I see this thing I think I see #KAG)
[ Post Reply | Private Reply | To 58 | View Replies]

To: ken in texas

Help me out here.
What has an email or email password got to do with passwords on other accounts?


87 posted on 06/09/2021 1:27:09 PM PDT by Carriage Hill (A society grows great when old men plant trees, in whose shade they know they will never sit..)
[ Post Reply | Private Reply | To 1 | View Replies]

To: carriage_hill

“ Help me out here.
What has an email or email password got to do with passwords on other
accounts? “

Well, since email is commonly used to set up and verify credentials for
other accounts, once your email is compromised, they can be as well.


88 posted on 06/09/2021 1:43:28 PM PDT by EasySt (Say not this is the truth, but so it seems to me to be, as I see this thing I think I see #KAG)
[ Post Reply | Private Reply | To 87 | View Replies]

To: EasySt

Thanks.


89 posted on 06/09/2021 1:54:45 PM PDT by Carriage Hill (A society grows great when old men plant trees, in whose shade they know they will never sit..)
[ Post Reply | Private Reply | To 88 | View Replies]

To: ken in texas

Is this limited to Apple operating system?


90 posted on 06/09/2021 1:56:12 PM PDT by Freedom56v2 (If I wanted to live in China, I would move there!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Freedom56v2; dayglored
No. Dayglored sums it up in Post 68.
91 posted on 06/09/2021 2:01:03 PM PDT by ken in texas
[ Post Reply | Private Reply | To 90 | View Replies]

To: Gay State Conservative

My password’s as safe as can be: “1 2 3 4 5”.


92 posted on 06/09/2021 2:10:47 PM PDT by jdsteel ("A Republic, Madam, if you can keep it." Sorry Ben, looks like we blew it.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: dayglored

It has NOTHING to do with Apple or Apple users. The gratuitous mention of Cook and Apple is bullsh*t pseudo-journalism to spice it up.

This leak is a huge list of ONLY passwords. No emails, no usernames
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Thank you for the clarification.

However, I’m wondering if this leak is just a huge list of ONLY passwords, how would a hacker be able to merge them with user names and/or email addresses?


93 posted on 06/09/2021 2:11:35 PM PDT by Freedom56v2 (If I wanted to live in China, I would move there!)
[ Post Reply | Private Reply | To 68 | View Replies]

To: ken in texas

Thank you!


94 posted on 06/09/2021 2:11:56 PM PDT by Freedom56v2 (If I wanted to live in China, I would move there!)
[ Post Reply | Private Reply | To 91 | View Replies]

To: ken in texas

I have a password that is 100% unbreakable.

BidenHarrisTellTheTruthIn2021

Zero chance that could ever be guessed.


95 posted on 06/09/2021 2:15:26 PM PDT by HereInTheHeartland (Leave me alone, I have no incriminating evidence on the Clintons)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rarestia

Yeah. And MS is heavily embracing oauth. What I work on integrates with MS a lot. So I’ve been beating my head against the oauth wall frequently as they roll to another app and another and another. Biggest problem being that they’re MS and they just have to do things a little different than the standard. “We want to put your tenantId that doesn’t exist in oauth into your issuer URL, why, we’re MS, just do it.”


96 posted on 06/09/2021 2:19:30 PM PDT by discostu (Like a dog being shown a card trick )
[ Post Reply | Private Reply | To 82 | View Replies]

To: discostu

“information that identifies your machine”

I’ve heard that each individual cpu chip has a unique identification that can be accessed and then obviously put into an outgoing message. The outgoing message could be spoofed too.

An outgoing message could be spoofed to anything desired.

Don’t know whether this is a weakness of the token scheme.

The ultimate hack would be someone standing beside the person with access ability threatening him if he doesn’t open the door.


97 posted on 06/09/2021 2:57:28 PM PDT by cymbeline
[ Post Reply | Private Reply | To 81 | View Replies]

To: cymbeline

That’s why they don’t put it out directly. Hash it, bury it in the token with a bunch other stuff including the random characters that are the heart of tokens.


98 posted on 06/09/2021 3:00:46 PM PDT by discostu (Like a dog being shown a card trick )
[ Post Reply | Private Reply | To 97 | View Replies]

To: Freedom56v2
> However, I’m wondering if this leak is just a huge list of ONLY passwords, how would a hacker be able to merge them with user names and/or email addresses?

They wouldn't be able to do that.

The value of a list of passwords is to feed into a "brute-force" program that tries a bazillion passwords one at a time until it finds one that works.

A list like this narrows down the number of possible combinations a LOT and saves the crackers a lot of time, compared to trying every possible combination of characters and lengths.

99 posted on 06/09/2021 4:20:28 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 93 | View Replies]

To: a fool in paradise
>> This leak is a huge list of ONLY passwords. No emails, no usernames.

> you can search by email and find matches

What I read says that there are no email addresses in this list. What do you mean "search by email", if there are no email addresses to search by?

100 posted on 06/09/2021 4:22:14 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 71 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-110 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson