What we know so far about “the mother from all data violations”

Photo of author

By [email protected]


Back to the data Very common These days, when a new one is announced, most web users can do more than yawning and complete something like “Yes, not shit” before passing to the next story in the news file. This week, however, a violation has been announced claiming to be So Huge on Earth managed to penetrate the Internet wall from collective mockery.

It was called “Mother of all data violationsThe violation is said to include about 16 billion user credit data, and affects a large number of accounts on platforms such as Facebook, Google and Apple. The violation was initially reported by Cyber ​​News, a website that focuses on web safety, and Written Deputy Editor and Site Researcher, Philius Petkoskas. The story, published on Wednesday, claims that the breach represents “one of the biggest data violations in history.”

Petkauskas’s article describes the discovered violation as “a large number of high data sets, and inhabits billions of billions of billions of entry login accreditation” obtained from “social media and institutional platforms to VPNS and developed Portals.” This data is obtained from “30 open data sets”. The researchers say it contains “tens of millions to more than 3.5 billion records each.” Researchers say they were able to discover exposed data collections due to unsafe protection online, although they say that exposure did not last long for them to know who was “controlled” in the data.

“This is not just a leak – it is a plan for collective exploitation,” said the researchers who met the site. “With more than 16 billion login records, Internet criminals now have unprecedented access to personal accreditation data that can be used to seize the account, steal identity and very targeted hunting.”

The Cyber ​​News story has been captured by a number of major ports, including Forbes and Axios. However, the news did not start circulating the Internet more than the professionals began in security Calling the article claims is a question. According to critics, Cyber ​​News is not a mistake in itself from the number of credentials that have been exposed – this is shocking enough news on its own. However, some observers confirm that this is not a new breach (as it is not a traditional sense), it is just data from a group of ancient breaches that have been stabbed and published online.

“To be clear, this is not a new data breach, or a breach at all, and the websites concerned have not been recently hacked to steal these credit data,” The computers write Bleeping.

Meanwhile, VX-Anderground, a media site that publishes about the malware samples on the web, Tweet about the storyHe described it as “a fear of 16,000,000,000 passwords for re -leakage password, which scares standards and spreads wrong information.”

Unfortunately, major violations occur all the time, and because of the way the electronic crime world is organized about sharing stolen data, data is circulated from many of these violations and recycled on web sites. Sometimes, this information college will collect very large files for these violations and spread them as something new – which researchers claim here.

However, the Cyber ​​News story appears to be in contrast to the allegations made by security researchers somewhat. She says that the data revealed is “Haditha” and “not only recycled from old violations.” The cyber news story also includes the evacuation of responsibility that says: “This story, based on the unique CyberNews results and was originally published on the site on June 18, is constantly updated by the additional clarifications and information in response to public discourse.” Gizmodo connects to Cyber ​​News to comment.

The penetration is still interesting to how to highlight the risk of a specific tool in the Dark Web Cretin tool group, harmful programs known as “Infostealer”. Infostealer – it seems exactly – is a program, as soon as a device is injured, it will absorb the login approved data that was saved in the computer browser. From the very effective tool, electronic criminals can use automated tools to collect large lists of personal information that can be used for road settlements.

Regardless of whether or not this includes or not, it may be the right time to activate your login recordings. The functions of infiltrators become easier day by day.



https://gizmodo.com/app/uploads/2025/06/Server-farm-1200×675.jpg

Source link

Leave a Comment