The e-mail addresses, passwords visible in clear or usernames … Nearly 33 million identifiers used to connect to Twitter are now on sale at dark web.
The leak was revealed by LeakedSource specialized site. The social network reacted quickly, telling Reuters that such information has not been obtained after a hacking platform. “Our systems have been infiltrated,” says the American company.
Information confirmed by LeakedSource, explaining that the data could be stolen by malware. These malware gained access to logins and passwords stored in Internet browsers like Chrome and Firefox. Logically, the same hackers were able to access the credentials stored for other social networks and websites.
Whether his credentials were stolen
LeakedSource offers a search engine to see if an account is affected by this leak or not. It also checks whether its MySpace IDs, LinkedIn or Badoo, hacked recently, were stolen.
The specialized site, which had access to all data before using guard users, published the list of domain names involved in the leak. The victims are mostly Russians. LeakedSource identified in the database more than 5 million e-mails ending in “@ mail.ru” and several hundred thousand others ending in “.ru”. Then come the “@ yahoo.com” with 4.7 million occurrences, “@ hotmail.com” (4.5 million) and “@ gmail.com” (3.3 million).
A new password robust
It is advisable to change the password immediately on Twitter. The new must be “robust”. That is to say, in uppercase letters, lowercase letters, letters and numbers or special characters, to discourage other hackers, who would not use the same method.
Despite reservations by regular guard against hackers, password predictable” 123456 “is still widespread. LeakedSource indicates that 120,417 accounts affected by the leak using this code. Next come “123456789″ (32,775 accounts), “qwerty” (22770) “password” (17471) and “1234567″ (14,401). We will have to show a lot more imagination to protect their online accounts. Especially if they use the same login password
AG
. <- / tpl_article / articles_associes -> <- tpl_article / bloc_servitiel -> <- nbrPV!!! 0 -> <- status: non-registered ->
No comments:
Post a Comment