The possibility of this Data can be inadvertently exposed in a Had it formed or Otherwise, not guaranteed Database It has long been a nightmare of privacy. But the new discovery of a huge group of 184 million records – including Apple, Facebook and Google Logins and accreditation machines for multiple government -related accounts – is due to the risk of collecting sensitive information recklessly in a warehouse that can become one point of failure.
In early May, a hunting and security researcher was discovered for data and security researcher Girimia Fowler Flexible database It contains 184,162,718 records over more than 47 GB of data. Fowler usually says, he is able to collect evidence about those who control an open database of its contents – indicates the institution, data related to its customers, employees, or other indicators indicating the reason for collecting data. However, this database did not include any evidence about who has data or where it was collected.
The huge range and the huge range of login details, which include accounts related to a wide range of digital services, indicates that data is a type of assembly, and may be kept by researchers who are looking for data breach or any online galaxy activity or directly owned by the attackers and are stolen by Infostealer Harmful programs.
“This may be one of the strangest things that I found in many years,” says Fowler. “With regard to the danger factor here, this is much larger than most of the things I find, because this is the direct access to individual accounts. This is the list of the work of the dreamsriminal dreams.”
Each record includes an identified account mark and URL for each site or service, then user names and text passwords. Fowler notes that the password field was called “Senha”, the Portuguese word of the password.
In a sample of 10,000 records analyzed by FOWLER, there were 479 Facebook accounts, 475 Google accounts, 240 Instagram accounts, 227 Roblox accounts, 209 Discord accounts, more than 100 from Microsoft, Netflix and Paypal. This sample – just a small part of the total exposure – also included Amazon, Apple, Nintendo, Snapchat, Spotify, Twitter, WordPress and Yahoo Logins, among many others. Re -search for the sample keywords by Fowler 187 cases of the word “Bank” and 57 from “Wallet”.
Fowler, who did not download the data, says he contacted a sample of open email addresses and heard from each other that they were real accounts.
Aside from individuals, open data also provided potential national security risks, says Fowler. In the 10,000 sample records, there were 220 email addresses with. This was linked to at least 29 countries, including the United States, Australia, Canada, China, India, Israel, New Zealand, Saudi Arabia and the United Kingdom.
While Fowler was unable to determine who assembled the database together or from where the login details were originally, he was reported that the data was exposed to the Host Host group, the hosting company that was linked to it. Fowler says that access to the database has been closed quickly, although the Global Hosts group did not respond to the researcher even after contacting it by WIRE.
https://media.wired.com/photos/682e4263446d9bfdd827e549/191:100/w_1280,c_limit/data-breach-sec-522166226.jpg
Source link