Proton Exposes 300 Million Stolen Credentials — 49% Include Passwords

Proton Exposes 300 Million Stolen Credentials — 49% Include Passwords


Passwords are the keys to your online kingdom. An attacker with the correct password can access accounts and the data within and even beyond them; that’s a security no-brainer, right? So why are hundreds of millions of them ending up on the dark web to be traded by threat actors? In the last 10 days alone, we have seen reports of humanized password stealers targeting Android users, a 183 million credential leak that included Gmail account passwords, and password manager giant LastPass having to issue warnings to users after active master password attacks were reported. Now, the Swiss-based internet privacy outfit Proton has confirmed that it has uncovered a total of 300 million credentials, with passwords appearing in 49% of them, using a new dark web Data Breach Observatory tool.

ForbesLinkedIn DM Attack Warning — What Users Need To Know

300 Million Individual Records Exposed On Dark Web By Proton

As the move towards a passwordless future plods ever slowly on, with many hurdles to overcome despite the best efforts of the likes of WhatsApp and Google, passwords remain one of the weakest links in your account security protections. Everything from password reuse, and please don’t do that, to successful phishing and other attacks, exposes password users to risk. This has been oh-so-clearly demonstrated with the launch of the Data Breach Observatory resource by Proton.

Rather than rely upon disclosures from impacted organizations, Proton has gone directly to the source of the stolen data: the dark web and criminal marketplaces therein, where stolen credentials are traded. The Data Breach Observatory provides consumers and businesses alike “previously unobtainable transparency,” Proton said, by drawing data from the criminals themselves.

The numbers are, frankly, both shocking to read and reasonably expected given the state of password security. Over 300 million individual records exposed, and this does not include the ‘combo’ datasets that aggregate and duplicate data from other leaks, with 71% identified as being from SMBs and 49% including passwords.

“Data breaches targeting online services are becoming ever more frequent, with over three hundred million individual records already exposed this year on the dark web,” Eamonn Maguire, director of engineering, AI & ML, at Proton, said. “If your credentials are compromised, receiving timely alerts is essential to secure your accounts, prevent identity theft, and minimize financial losses,” Maguire concluded. You know what to do: check for any leaked credentials now, switch to using passkeys wherever possible, and ensure that two-factor authentication is in place where not.

ForbesNew Research Claims iPhone Less Safe Than Google Android Phones



Forbes

Leave a Reply

Your email address will not be published. Required fields are marked *