More than 770 million email addresses and 22 million unique passwords were found online by information security researcher Troyan Hunt, the owner of the infosec website. The file with all email addresses and passwords has been uploaded to Have I Been Pwned so people can check if they are affected by the violation.
It is currently unclear who first uploaded the data or where the violation occurred. Data data found on a "popular hacking forum" contains 2,692,818,238 lines of data collected from thousands of sources. Hunt discovers that there are 772 904 991 unique email addresses in the file, along with 21 222 975 unique passwords for plain text.
According to Hunt, it was targeted at MEGA, a popular cloud platform that contained a tremendous amount of data distributed in over 1
2,000 different files, under the heading "Collection # I", which he called this violation. The files amount to more than 87 GB of data that were shared on the previously mentioned "popular hacking forum". he confirms that his or her own data is among the email addresses and passwords that are shared.
"Like many of you who are reading this," Hunt writes in the blog where he declares the violation. have led to my email addresses and yes, my passwords that are publicly distributed. Fortunately, only passwords that are no longer used, but still feel the same sense of anxiety that many people read this when I see them again. "
How to check if your information is shared
Hunt has uploaded all the data in a secure way to your site so visitors can see if they are affected by the violation that many of you will read. "About 2.2 million [offered by Have I Been Pwned] and 768,000 of them are in this violation," according to Hunt, so it's safe to say that one in three readers of this article is likely to be affected if not
There is a database to search for compromised passwords that users of Hunt can use to see if their passwords have been compromised in violation, according to Hunt, half of the passwords in #I already are not in the database, which means they were only compromised.
Hunt is categorical in front of prezhdenieto before the public: "If – like me – you have this list, people who intend to break into online accounts, distribute it among themselves and try to take advantage of all shortcuts that you can use with online security. I hope that for many this will be the speed they need to make an important change in their online security. "