Skip to comments.
1.2 Billion Stolen User Names, Passwords Reportedly Collected By Russian Hackers
Consumerist ^
| 06 August 2014
| Chris Morran
Posted on 08/06/2014 10:25:50 AM PDT by Lorianne
Through hacks of hundreds of thousands of websites, a Russian crime ring has reportedly gained access to 1.2 billion user name and password combinations, along with hundreds of millions of e-mail addresses.
The NY Times reports on records turned up by Milwaukee-based Hold Security, which claims to have turned up evidence of this massive cache of data, stolen from some 420,000 different websites.
Hackers did not just target U.S. companies, they targeted any website they could get, ranging from Fortune 500 companies to very small websites, Alex Holden, the founder and chief information security officer of Hold Security, tells the Times. And most of these sites are still vulnerable.
The company is not naming victims for various reasons, including the fact that it doesnt want to encourage attacks on sites that remain vulnerable to hacks. Some of the companies victimized by the hack are already aware that their data has been compromised.
Holden says he plans to alert law enforcement to his companys findings, but the Times points out that the Russian government has a history of not making cybercrime a priority.
Unlike other hackers who make money by selling stolen credentials on the black market, it appears that most of the info taken by the Russian hackers is being used to send spam.
(Excerpt) Read more at consumerist.com ...
TOPICS: Business/Economy; Crime/Corruption; Foreign Affairs
KEYWORDS: emailaddresses; hackers; passwords; russiagang; usernames
Navigation: use the links below to view more comments.
first 1-20, 21-27 next last
1
posted on
08/06/2014 10:25:50 AM PDT
by
Lorianne
To: Lorianne
Pay up or the squirrel gets it.
To: Lorianne

Peggy DID IT! ......................
3
posted on
08/06/2014 10:30:17 AM PDT
by
Red Badger
(If you compromise with evil, you just get more evil..........................)
To: Lorianne
A pipe dream of mine would be to create an entire company of nerds who attack the website servers of spammers and hackers 24/7.
4
posted on
08/06/2014 10:33:59 AM PDT
by
Vigilanteman
(Obama: Fake black man. Fake Messiah. Fake American. How many fakes can you fit in one Zer0?)
To: Red Badger
Opulence. I has it!
5
posted on
08/06/2014 10:34:09 AM PDT
by
rarestia
(It's time to water the Tree of Liberty.)
To: Lorianne
Все ваши базы принадлежат нам
6
posted on
08/06/2014 10:44:48 AM PDT
by
smokingfrog
( sleep with one eye open (<o> ---)
To: Lorianne
Good grief; great job, 0bummer! You commie pig.
Can someone please, please post a cartoon pic of Boris and Natasha? thanks
To: Lorianne
So the ACA website is finally working.
8
posted on
08/06/2014 10:53:50 AM PDT
by
rawcatslyentist
(Jeremiah 50:32 "The arrogant one will stumble and fall ; / ?)
To: Lorianne
Time for the NSA and CIA to track down these bastards and eliminate them.
Oops the NSA is to busy spying on Good Americans to spy on and neutralize enemies.
Oops, the CIA is controlled by the Sunni Muslim Brennan, and he and his boss want Americans to lose everyday.
9
posted on
08/06/2014 11:00:22 AM PDT
by
Grampa Dave
( Obama's Storm of Illegal immigrants, aka, new democRat voters and his 2016 FDR 3rd term attempt!)
To: CincyRichieRich
Can someone please, please post a cartoon pic of Boris and Natasha? thanks
10
posted on
08/06/2014 11:05:42 AM PDT
by
Grampa Dave
( Obama's Storm of Illegal immigrants, aka, new democRat voters and his 2016 FDR 3rd term attempt!)
To: Lorianne
I have at least eight email addresses. Heck, my dog has an email address. She doesn’t get much mail, but still... As far as user names and passwords I have a couple of dozen, many of which lead nowhere. So 1.6 billion is not the same as 1.6 billion people. I have created and forgotten accounts on many occasions and there are many that I have but don’t use any more. My most important is my FR handle.
11
posted on
08/06/2014 11:06:27 AM PDT
by
webheart
(We are all pretty much living in a fiction.)
To: Red Badger
One of the funniest commerical ideas ever
12
posted on
08/06/2014 11:07:19 AM PDT
by
WhyisaTexasgirlinPA
(Turmoil in the Middle East? Quick Obama, show them your Peace Prize!)
To: smokingfrog
Все ваши базы принадлежат нам Ha! I don't read Russian, but I have an app called WORD LENS on my phone which uses the camera to look at a page, and shows me a picture in English.
AYBABTU, indeed.
13
posted on
08/06/2014 11:08:08 AM PDT
by
Izzy Dunne
(Hello, I'm a TAGLINE virus. Please help me spread by copying me into YOUR tag line.)
To: Lorianne
Any website worth it's salt encrypts the client's password. The encryption is generally secure (I'm not talking NSA here) but stupid passwords like "123456" or "password" are found using a look-up table. A password like "ut*m5%8Pn7y", not so much.
14
posted on
08/06/2014 11:08:20 AM PDT
by
867V309
(Don't tread on me, bro)
To: 867V309
Any website worth it's salt encrypts the client's password. There was a story linked (video actually) here this morning that showed how the good companies store password data. Essentially, they don't. They store hashdata based upon the password itself, but not the password. The really good ones use a system that cannot go from the hashdata to your password.
If any company sends you your password, you need to stop doing business with them, as they are maintaining something that can be hacked.
15
posted on
08/06/2014 11:12:54 AM PDT
by
IYAS9YAS
(Has anyone seen my tagline? It was here yesterday. I seem to have misplaced it.)
To: IYAS9YAS; 867V309
16
posted on
08/06/2014 11:15:47 AM PDT
by
IYAS9YAS
(Has anyone seen my tagline? It was here yesterday. I seem to have misplaced it.)
To: IYAS9YAS
"Hash data" is the password after salting and encryption. It is a one-way process where the password plus salt always yields the same "hash data" (or encrypted password) but there is no way to determine the password from the encrypted version unless you can guess it.
17
posted on
08/06/2014 11:21:49 AM PDT
by
867V309
(Don't tread on me, bro)
To: 867V309
"Hash data" is the password after salting and encryption. It is a one-way process where the password plus salt always yields the same "hash data" (or encrypted password) but there is no way to determine the password from the encrypted version unless you can guess it.Yes. I've had some places that claim to encrypt my password, but they then are also able to return that password to me, so I know it's not actually encrypted using hashing data.
18
posted on
08/06/2014 11:25:02 AM PDT
by
IYAS9YAS
(Has anyone seen my tagline? It was here yesterday. I seem to have misplaced it.)
To: IYAS9YAS
Yes. I've had some places that claim to encrypt my password, but they then are also able to return that password to me, so I know it's not actually encrypted using hashing data.
Yikes! I agree, avoid them like the plague unless the need for security is trivial.
19
posted on
08/06/2014 11:29:15 AM PDT
by
867V309
(Don't tread on me, bro)
To: Lorianne
I hope they didn't get the password to my Simpson's Tapped Out game...
20
posted on
08/06/2014 11:39:10 AM PDT
by
WayneS
(Don't blame me, I voted for Kodos.)
Navigation: use the links below to view more comments.
first 1-20, 21-27 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson