{"id":99568,"date":"2024-01-25T02:02:34","date_gmt":"2024-01-25T08:02:34","guid":{"rendered":"https:\/\/milesfortis.com\/?p=99568"},"modified":"2024-01-25T02:02:34","modified_gmt":"2024-01-25T08:02:34","slug":"99568","status":"publish","type":"post","link":"https:\/\/milesfortis.com\/?p=99568","title":{"rendered":""},"content":{"rendered":"<p><a href=\"https:\/\/nypost.com\/2024\/01\/23\/lifestyle\/extremely-dangerous-leak-reveals-26-billion-account-records-stolen-from-twitter-linkedin-more-mother-of-all-breaches\/\">\u2018Mother of all breaches\u2019 data leak reveals 26 billion account records stolen from Twitter, LinkedIn, more.<\/a><\/p>\n<p>One of the largest data breaches to date could compromise billions of accounts worldwide, prompting concerns of widespread cybercrime.<\/p>\n<p>Dubbed the \u201cMother of All Breaches,\u201d the massive leak revealed 26 billion records \u2014 including popular sites like LinkedIn, Snapchat, Venmo, Adobe and X, formerly Twitter \u2014 in what experts are calling the biggest leak in history.<\/p>\n<p>The compromised data includes more than just login credentials, according to experts. Much of it is \u201csensitive,\u201d making it \u201cvaluable for malicious actors,\u201d per Cybernews, which first discovered the breach on an unsecured website.<\/p>\n<p>\u201cThe dataset is extremely dangerous as threat actors could leverage the aggregated data for a wide range of attacks, including identity theft, sophisticated phishing schemes, targeted cyberattacks, and unauthorized access to personal and sensitive accounts,\u201d the researchers, comprised of cybersecurity expert Bob Dyachenko and the team at Cybernews, explained.<\/p>\n<p>The latest data breach is considered the largest of all time.<\/p>\n<p>Cybernews\u2019 head of security research Mantas Sasnauskas told the Daily Mail that \u201cprobably the majority of the population have been affected.\u201d<\/p>\n<p><!--more--><\/p>\n<p>The one glimmer of hope, though, is that the 12 terabytes of data, which appears to be a meticulous compilation of many breaches (COMB), does not contain anything \u201cnewly stolen.\u201d<\/p>\n<p>Cybernews said it \u201cdiscovered billions upon billions of exposed records on an open instance,\u201d which means it was open for anyone to see.<\/p>\n<p>Experts are urging users to stay vigilant about phishing scams and to change their passwords.<\/p>\n<p>While the owner is likely to never be identified, the team hypothesized that they could be a data broker, malicious cybercriminal or someone with access to large amounts of data.<\/p>\n<p>The largest amount of data exposed is from the Chinese instant messaging platform Tencent, with 1.4 billion records compromised.<\/p>\n<p>Weibo trailed behind with 504 million records leaked, MySpace with 360 million, Twitter with 281 million, music streaming platform Deezer with 258 million and LinkedIn with 251 million.<\/p>\n<p>Other major sites include Adobe, Telegram and Dropbox, as well as lesser-known sites like Doordash, Canva and Snapchat and various government organizations around the world, including those in the US.<\/p>\n<p>Cybernews has compiled a searchable list online where users can look up potentially compromised sites.<\/p>\n<p>Users can also look up email addresses and phone numbers using Cybernews\u2019 personal data leak checker.<\/p>\n<p>The scale of the leak\u2019s impact is likely to be \u201cunprecedented,\u201d according to Cybernews, and the sheer volume of data compromised makes past breaches look minuscule in comparison.<\/p>\n<p>In November, the outlet reported a COMB that revealed 3.2 billion records, which was considered the \u201clargest breach of all time\u201d when discovered.<\/p>\n<p>\u201cWe should never underestimate what cybercriminals can achieve with such limited information,\u201d Eset\u2019s global cybersecurity advisory Jake Moore told Computer Weekly.<\/p>\n<p>\u201cIf users use the same passwords for their Netflix account as they do for their Gmail account, attackers can use this to pivot towards other, more sensitive accounts,\u201d they explained.<\/p>\n<p>\u201cApart from that, users whose data has been included in supermassive MOAB may become victims of spear-phishing attacks or receive high levels of spam emails.\u201d<\/p>\n<p>Experts have long advised against re-using the same, easily guessed passwords for multiple accounts, while recommending the use of a password manager to create and store strong logins.<\/p>\n<p>\u201cWe should never underestimate what cybercriminals can achieve with such limited information,\u201d Eset\u2019s global cybersecurity advisory Jake Moore told Computer Weekly.<\/p>\n<p>He urged people to change their passwords promptly, stay vigilant against phishing emails and turn on two-factor authentication for all accounts, regardless of whether they were affected by the latest breach.<\/p>\n<p>\u201cMany systems share platforms and are aggressively attempted with the latest attacks,\u201d he continued. \u201cLots of networks rely heavily on updates, but when a vulnerability is located, it is a race against time to patch the issue before the data is compromised.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u2018Mother of all breaches\u2019 data leak reveals 26 billion account records stolen from Twitter, LinkedIn, more. One of the largest data breaches to date could compromise billions of accounts worldwide, prompting concerns of widespread cybercrime. Dubbed the \u201cMother of All Breaches,\u201d the massive leak revealed 26 billion records \u2014 including popular sites like LinkedIn, Snapchat, &hellip; <a href=\"https:\/\/milesfortis.com\/?p=99568\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[87],"tags":[],"class_list":["post-99568","post","type-post","status-publish","format-standard","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/milesfortis.com\/index.php?rest_route=\/wp\/v2\/posts\/99568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/milesfortis.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/milesfortis.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/milesfortis.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/milesfortis.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=99568"}],"version-history":[{"count":1,"href":"https:\/\/milesfortis.com\/index.php?rest_route=\/wp\/v2\/posts\/99568\/revisions"}],"predecessor-version":[{"id":99569,"href":"https:\/\/milesfortis.com\/index.php?rest_route=\/wp\/v2\/posts\/99568\/revisions\/99569"}],"wp:attachment":[{"href":"https:\/\/milesfortis.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=99568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/milesfortis.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=99568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/milesfortis.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=99568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}