Russian hacker gang amasses 'largest ever' database of online credentials

Fewer than a dozen hackers in their 20s amassed the data which includes passwords, emails and usernames - but no financial data

James Vincent
Thursday 07 August 2014 01:29 EDT
Comments
The eBay hackers elicited customers’ names,
encrypted passwords, email addresses, physical
addresses, phone numbers and dates of birth
The eBay hackers elicited customers’ names, encrypted passwords, email addresses, physical addresses, phone numbers and dates of birth (Reuters)

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

A group of Russian hackers have amassed the largest ever cache of stolen internet credentials, reportedly accumulating more than 1.2 billion user name and password combinations and more than 500 million email addresses.

News of the group’s efforts comes from US firm Hold Security, who were previously responsible for uncovering the Adobe Systems hack of some 38 million accounts last year.

Hold Security said the hackers, based in a small city in south-central Russia, took information from more than 420,000 websites.

“Hackers did not just target U.S. companies, they targeted any website they could get, ranging from Fortune 500 companies to very small websites,” Alex Holden, the founder and Hold Security told the New York Times. “And most of these sites are still vulnerable.”

The US firm has not disclosed the identity of any of the targets, but say that the Russian gang used an infected botnet to conduct “possibly the largest security audit ever”, probing hundreds of thousands of websites looking for weaknesses.

Although the stolen information does not include financial data such as credit card numbers, the sheer size and scope of the cache has been described as a threat to both consumers and companies.

The Times reports that so far little of the stolen data yet been put to use, and that those logins that have been exploited are mainly being used to send spam messages on social networks like Twitter.

Hold Security uncovered the existence of the stolen data after a 7 month investigation, identifying fewer than a dozen men in their 20s who make up the gang. The men know one another socially and reportedly divide their work “like a small company”.

Mr Holden said his firm had begun alerting affected companies but warned that many of the sites involved were still vulnerable. Experts have cautioned that although no financial data was stolen, the online credentials taken by the gang could be just as damaging in terms of identity theft.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in