Data

The Collections #2-5 leak of 2.2 billion email addresses might have your information, German news site, Heise reports

3 min read

In recent years, hackers have breached companies like Dropbox and LinkedIn by stealing 71 million and 117 million passwords, respectively. This month, Troy Hunt, security researcher identified the first portion of the data dump, named Collection #1, which has a set of breached databases. He represented 773 million unique usernames and passwords. Other researchers have now obtained and analyzed an additional vast database called Collections #2–5. It has 845 gigabytes of stolen data and 25 billion records in all.

German news site Heise reported that Collection of 2.2 billion unique usernames and associated passwords has been distributed on hacker forums and torrents. According to the researchers at the Hasso Plattner Institute, 611 million credentials in Collections #2–5 weren’t included in the Collection #1 database. Chris Rouland, cybersecurity researcher and founder of the IoT security firm Phosphorus.io, who also pulled Collections #1–5 from torrented files, said, “This is the biggest collection of breaches we’ve ever seen.”

According to Rouland, as the collection has already been circulated amongst hackers, the tracker file which he downloaded was being seeded by more than 130 people who possessed the data dump. It has also been downloaded more than 1,000 times.

In a statement to WIRED, Rouland said, “It’s an unprecedented amount of information and credentials that will eventually get out into the public domain.”

According to WIRED, most of the stolen data appears to come from previous thefts, like the breaches of LinkedIn, Yahoo, and Dropbox. WIRED has examined a sample of the data and further confirmed that the credentials are valid, but mostly represent passwords from the previous years’ data leaks.

This collection could be used as a powerful tool for unskilled hackers as they can try a technique called credential stuffing. With this technique, users can try previously leaked usernames and passwords on any website with the hope that people have reused passwords.

Rouland said, “For the internet as a whole, this is still very impactful.”

Who knows if we are targeted too? What should one do?

Users can check for their usernames in the breach using Hasso Plattner Institute’s tool. This identity leak checker asks for users’ email address then uses that email ID to generate a list of information including users’ name, IP address, and password, if applicable. It tells the users if a password has been matched to their email address. It can also tell how recent that password actually is.

One should change passwords for any breached sites it flags. It is advisable to not reuse passwords, and use password manager. A password manager can automatically generate unique, secure passwords for the services user uses. Users should turn on the two-factor authentication wherever possible. Though the two-factor authentication isn’t foolproof, it provides a layer of security.  

Troy Hunt’s service HaveIBeenPwned helps in checking if the passwords have been compromised, though it doesn’t yet include Collections #2-5.

Read Next

Internal memo reveals NASA suffered data breach compromising employees social security numbers

Former Senior VP’s take on the Mariott data breach; NYT reports suspects Chinese hacking ties

Equifax data breach could have been “entirely preventable”, says House oversight and government reform committee staff report

Amrata Joshi

Share
Published by
Amrata Joshi

Recent Posts

Top life hacks for prepping for your IT certification exam

I remember deciding to pursue my first IT certification, the CompTIA A+. I had signed…

3 years ago

Learn Transformers for Natural Language Processing with Denis Rothman

Key takeaways The transformer architecture has proved to be revolutionary in outperforming the classical RNN…

3 years ago

Learning Essential Linux Commands for Navigating the Shell Effectively

Once we learn how to deploy an Ubuntu server, how to manage users, and how…

3 years ago

Clean Coding in Python with Mariano Anaya

Key-takeaways:   Clean code isn’t just a nice thing to have or a luxury in software projects; it's a necessity. If we…

3 years ago

Exploring Forms in Angular – types, benefits and differences   

While developing a web application, or setting dynamic pages and meta tags we need to deal with…

3 years ago

Gain Practical Expertise with the Latest Edition of Software Architecture with C# 9 and .NET 5

Software architecture is one of the most discussed topics in the software industry today, and…

3 years ago