Explorer

ALERT! Around 10 Billion Passwords Have Been Stolen, Here's How It Might Affect You

9,948,575,739 passwords have been stolen and stored in a file named RockYou2024.txt as unique plaintext passwords.

In a major cyberattack, probably one of the biggest password compilations ever has been leaked recently. According to Cybernews, a forum named ObamaCare posted a file titled RockYou2024.txt which contains 9,948,575,739 unique plaintext passwords. The report stated that this file contains passwords stolen in a mix of old and new attacks. Approximately three years back, the RockYou2021 password compilation exposed 8.4 billion plain text passwords and the latest leak adds an extra 1.5 billion passwords to the list.

Akin to numerous other data leaks, this RockYou2024 database also allows potential criminals and cyber attackers to conduct 'brute-force' attacks and also helps them get unauthorised access to the accounts which have been exposed in the leak. 

ALSO READ | Weekly Tech Wrap: CMF Phone 1 Price Creates Buzz Around Rumour Mill, Google Pixel 9 Leaks Surface, More

What Is Brute Force & Why Does It Matter

Brute force in simpler words is a technique that hackers use in order to crack passwords by writing a program which automatically tries every single possible combination of letters and numbers. If we have to understand the efficacy of this method then if someone is using a password as simple as '1234' then it can be cracked within seconds by a basic brute-force attack.

Brute force is not the only point of concern though. Furthermore, the RockYou2024 leak can also reduce the difficulty for attackers to use another technique known as credential stuffing. Credential stuffing is also a form of brute-force password attack and it takes advantage of people who recycle their login information, which in day-to-day use we call password reuse.

In a credential-stuffing attack, cybercriminals utilize usernames and passwords that have been exposed in a data breach and attempt to use them on various websites, aiming to gain access to accounts with weak security.

This method is akin to a brute-force attack, as cybercriminals will test numerous sets of credentials across multiple accounts.

Top Headlines

Jana Nayagan Leaked Online In HD: That Free Link Of Vijay’s Film Could Turn Into A Rs 3 Lakh Mistake
Jana Nayagan Leaked Online In HD: That Free Link Of Vijay’s Film Could Turn Into A Rs 3 Lakh Mistake
Why Anthropic Might Build Its Own AI Chips And What It Means
Why Anthropic Might Build Its Own AI Chips And What It Means
Your Phone Is Sharing Your Location Without Telling You: Here's How To Stop It
Your Phone Is Sharing Your Location Without Telling You: Here's How To Stop It
Did You Know You Can Schedule WhatsApp Messages? Here Is How To Do It
Did You Know You Can Schedule WhatsApp Messages? Here Is How To Do It

Videos

War Alert: Two-Day Islamabad Peace Talks and China-Iran Defense Claims Amid Rising Tensions
Breaking News: Islamabad Talks Amid Leadership Gestures and Rising Tensions
War Update: US–Iran Peace Talks in Islamabad Enter Critical Phase Amid High-Level Mediation
Breaking News: High-Profile US–Iran Peace Talks Advance in Islamabad After Delegations Arrive
Breaking: Iran-US Talks in Islamabad Amid Saudi Mediation and Regional Escalation

Photo Gallery

25°C
New Delhi
Rain: 100mm
Humidity: 97%
Wind: WNW 47km/h
See Today's Weather
powered by
Accu Weather
Embed widget