Categories: Tech & Society

Millions of social media passwords stolen by hackers

In the latest online hack attack, over two million passwords from social networking sites including Facebook, LinkedIn and Twitter were accessed and posted online by hackers. The news has left a mass-surge of changed passwords in an attempt to keep private and personal information safe from the prying eyes of strangers.

According to the Independent, the attack was “fairly global”, though some 96% were stolen from IP addresses based in the Netherlands. The attack has caused a mass panic in the Netherlands as many rush to save face and keep their information safe.

How it happened

It wasn’t until security researchers were looking into online safety that the list was found, posted online along with passwords for Google and Yahoo accounts included. The data was found when investigating the botnet “Pony”, which is a network of hacked computers accessed by gangs to perform illegal online activity.

The passwords are believed to have been stolen by the use of keylogger software. Previous attacks by the group were considered reasonably fast and somewhat insignificant on a global scale, though this is thought to have been performed over a number of weeks resulting in a steady and continuous flow of password release.

How to stay safe

The passwords that have been affected have all be notified and changed, but the data has revealed something even more surprising. The public’s passwords of choice have been seen to be woefully lacking in security, with some truly surprising combinations used.

Within the top ten passwords used amongst those stolen included “123456”, “123456789”, “1234”, “password” and even “1”. The researchers responsible for recovering the passwords said in a blog post:

“It all goes downhill from there. There were more terrible passwords than excellent ones, more bad passwords than good, and the majority, as usual, is somewhere in between in the Medium category”, the article went on to say.

Andrew Mason, Security Expert from RandomStorm commented on the findings, saying:

“This just goes to show about the important of endpoint security combined with a strong password. Even the strongest password is worthless if the endpoint it is being used on is either untrusted or trusted but insecure allowing a bonnet such as Pony to run on it and the subsequent password keylogger.

“Once the keylogger is installed it is very easy to harvest usernames and passwords for whatever the user types in during the course of their normal day. By ensuring proper endpoint security and at a minimum patching and up to date AV deployment these types of attacks can be totally eliminated.

“The second area of concern from the article is the use of weak passwords. Again, without a strong password it makes the job of a hacker so much easier being able to use an automated tool to crack many passwords per second.”

All in the past

In 2006, a list of passwords from MySpace was stolen in a similar manner and posted online, which weighs up pretty interesting results compared to today’s findings. The most common passwords from this current list made up 0.9% of passwords on the network and they have experienced a rise to 2.4% today.

Suumit

Hello, I am Suumit Shah. I’m Webmaster, Entrepreneur and Computer Engineer by profession. I love the world wide web and I always crave to learn new technologies in it. I hope I can help lot of geeks out there who are seeking of the knowledge about different technologies through this blog.

Recent Posts

Companies competing for AI talent are ready to pay high salaries but where is the talent?

While artificial intelligence (AI) shows potential to increase profitability across most industries, its adoption is…

8 hours ago

New tech on the block: FinTech, travel tech, AI, data streaming, cloud, agtech, EdTech

The Tech Panda takes a look at recent tech launches. FinTech: A new-age fintech company…

3 days ago

Guardians of blockchain: Reinforcing cybersecurity in the digital age

In the ever-evolving world of tech and global connectivity the cyber space is vulnerable to…

3 days ago

Deciphering E-Waste Hacking

Electronic waste — better known as e-waste — has been a massive problem for years.…

3 days ago

Geek Appeal: New gadgets & apps on the block

The Tech Panda takes a look at recently launched gadgets & apps in the market.…

6 days ago

Agtech foreign expansion & incoming business: Helping the farmer within & beyond shores

With the realization that the farmer is one of the most crucial aspects of any…

6 days ago