Bitcoin Forum
May 03, 2024, 10:33:42 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: [2014-09-11] 5 Million Gmail Usernames, Passwords Hacked And Posted To Russian B  (Read 5434 times)
cescan (OP)
Sr. Member
****
Offline Offline

Activity: 406
Merit: 250


View Profile
September 11, 2014, 05:33:03 AM
 #1

http://www.ibtimes.com/5-million-gmail-usernames-passwords-hacked-posted-russian-bitcoin-forum-report-1684368

Hackers appear to have dumped nearly 5 million Gmail usernames and passwords to a Russian bitcoin forum. Word first spread of the still-unconfirmed hack when a user posted a link to the log-in credentials in a security-centric corner of Reddit frequented by hackers, professional and aspiring.

The database (which International Business Times will not link to) contains 4.93 million Google accounts belonging to English-, Russian- and Spanish-speaking users. Posts on the Russian-language bitcoin security forum asserted that more than 60 percent of the identities in question were still in use and could be accessed immediately, reported RIA Novosti, a Russian media outlet.

"The nature of Bitcoin is such that once version 0.1 was released, the core design was set in stone for the rest of its lifetime." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714775622
Hero Member
*
Offline Offline

Posts: 1714775622

View Profile Personal Message (Offline)

Ignore
1714775622
Reply with quote  #2

1714775622
Report to moderator
1714775622
Hero Member
*
Offline Offline

Posts: 1714775622

View Profile Personal Message (Offline)

Ignore
1714775622
Reply with quote  #2

1714775622
Report to moderator
1714775622
Hero Member
*
Offline Offline

Posts: 1714775622

View Profile Personal Message (Offline)

Ignore
1714775622
Reply with quote  #2

1714775622
Report to moderator
Somekindabitcoin
Hero Member
*****
Offline Offline

Activity: 518
Merit: 500



View Profile
September 11, 2014, 05:34:59 AM
 #2

Lemme make sure none of my emails are in there Cheesy
Kluge
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1015



View Profile
September 11, 2014, 05:52:19 AM
 #3

Interestingly, they didn't even try accessing them all prior to it being publicly dumped. Reading around, agreement seems to be that the passwords lifted are from another site and isn't really even a Gmail-related hack as we'd normally think of it, but a hack of another site which decided to only publish users with an account tied to Gmail. Wife's account was in there, but the password listed is a reuse password for unimportant junk sites.

Glad I have 2FA all the same.
Amitabh S
Legendary
*
Offline Offline

Activity: 1001
Merit: 1003


View Profile
September 11, 2014, 06:18:04 AM
 #4

Lemme make sure none of my emails are in there Cheesy

where is the database.. even I need to check.


Coinsecure referral ID: https://coinsecure.in/signup/refamit (use this link to signup)
Kluge
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1015



View Profile
September 11, 2014, 06:34:57 AM
 #5

Lemme make sure none of my emails are in there Cheesy

where is the database.. even I need to check.


https://isleaked.com/en
Kakmakr
Legendary
*
Offline Offline

Activity: 3444
Merit: 1957

Leading Crypto Sports Betting & Casino Platform


View Profile
September 11, 2014, 10:21:49 AM
 #6

I only use online accounts for [spam] stuff. I rather like Thunderbird mobile on USB. [Your email content stays offline and you can take it, where you want]

When your account are hacked, they do not have access to the content. ^laugh^

..Stake.com..   ▄████████████████████████████████████▄
   ██ ▄▄▄▄▄▄▄▄▄▄            ▄▄▄▄▄▄▄▄▄▄ ██  ▄████▄
   ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██  ██████
   ██ ██████████ ██      ██ ██████████ ██   ▀██▀
   ██ ██      ██ ██████  ██ ██      ██ ██    ██
   ██ ██████  ██ █████  ███ ██████  ██ ████▄ ██
   ██ █████  ███ ████  ████ █████  ███ ████████
   ██ ████  ████ ██████████ ████  ████ ████▀
   ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██
   ██            ▀▀▀▀▀▀▀▀▀▀            ██ 
   ▀█████████▀ ▄████████████▄ ▀█████████▀
  ▄▄▄▄▄▄▄▄▄▄▄▄███  ██  ██  ███▄▄▄▄▄▄▄▄▄▄▄▄
 ██████████████████████████████████████████
▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄
█  ▄▀▄             █▀▀█▀▄▄
█  █▀█             █  ▐  ▐▌
█       ▄██▄       █  ▌  █
█     ▄██████▄     █  ▌ ▐▌
█    ██████████    █ ▐  █
█   ▐██████████▌   █ ▐ ▐▌
█    ▀▀██████▀▀    █ ▌ █
█     ▄▄▄██▄▄▄     █ ▌▐▌
█                  █▐ █
█                  █▐▐▌
█                  █▐█
▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█
▄▄█████████▄▄
▄██▀▀▀▀█████▀▀▀▀██▄
▄█▀       ▐█▌       ▀█▄
██         ▐█▌         ██
████▄     ▄█████▄     ▄████
████████▄███████████▄████████
███▀    █████████████    ▀███
██       ███████████       ██
▀█▄       █████████       ▄█▀
▀█▄    ▄██▀▀▀▀▀▀▀██▄  ▄▄▄█▀
▀███████         ███████▀
▀█████▄       ▄█████▀
▀▀▀███▄▄▄███▀▀▀
..PLAY NOW..
bryant.coleman
Legendary
*
Offline Offline

Activity: 3654
Merit: 1217


View Profile
September 11, 2014, 11:58:58 AM
 #7

Even if the password is hacked, they won't be able to steal the data from gmail accounts. That is because, Gmail asks for additional verification if a log-in is attempted from an IP which is unfamiliar with that particular account. (that is not the case with other mail providers, such as GMX). However, if the hacker is having additional verification details (such as the DOB), then it can get risky.  Angry
aigeezer
Legendary
*
Offline Offline

Activity: 1450
Merit: 1013


Cryptanalyst castrated by his government, 1952


View Profile
September 11, 2014, 12:14:42 PM
 #8


Be careful:

"All of the news articles are telling people to go to isleaked.com to check their addresses. However, I don’t think any of the media has vetted this website and could possibly be sending millions of people to a website run by people harvesting email addresses (for spam or other hacking activities.) It’s even possible that isleaked.com is run by the very people who leaked the passwords in the first place. Why do I think this? Because isleaked.com was registered on the 8th, 2 days before the story broke anywhere else."

http://jameswatt.me/2014/09/10/isleaked-com-registered-2-days-before-gmail-leak-public/

Murky situation, I think.
 
hacknoid
Sr. Member
****
Offline Offline

Activity: 418
Merit: 252


Proud Canuck


View Profile WWW
September 11, 2014, 12:39:21 PM
 #9


Be careful:

"All of the news articles are telling people to go to isleaked.com to check their addresses. However, I don’t think any of the media has vetted this website and could possibly be sending millions of people to a website run by people harvesting email addresses (for spam or other hacking activities.) It’s even possible that isleaked.com is run by the very people who leaked the passwords in the first place. Why do I think this? Because isleaked.com was registered on the 8th, 2 days before the story broke anywhere else."

http://jameswatt.me/2014/09/10/isleaked-com-registered-2-days-before-gmail-leak-public/

Murky situation, I think.
 

Indeed....  (from http://cointelegraph.com/news/112494/nearly-5m-gmail-credentials-leaked-on-russian-bitcoin-security-forum):

Quote
Gmail users are advised to avoid entering their username and password into any website claiming to check whether their credentials have been compromised. This method known as the 'honeypot' aims to steal even more identities, and many websites have already started distributing phishing messages. Russian website isleaked.com claims to help people checking if their accounts have been compromised and is already being accused of being run by the very people who leaked the database as its domain name was registered on September 8.

If you are checking for your name in a leaked database, why on earth would you also enter your password?  You can see if your name is there through a legit "service".  Any service that proposes to check whether your password is indeed the one in the database should not be trusted!!

(IOW, avoid isleaked.com!)

BitcoinRunner : Side scroller game powered entirely by Bitcoin! 
Game (alpha): http://hacknoid.ca/bitcoinrunner
Discussion: https://bitcointalk.org/index.php?topic=907618.0
Kluge
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1015



View Profile
September 11, 2014, 11:13:13 PM
 #10


Be careful:

"All of the news articles are telling people to go to isleaked.com to check their addresses. However, I don’t think any of the media has vetted this website and could possibly be sending millions of people to a website run by people harvesting email addresses (for spam or other hacking activities.) It’s even possible that isleaked.com is run by the very people who leaked the passwords in the first place. Why do I think this? Because isleaked.com was registered on the 8th, 2 days before the story broke anywhere else."

http://jameswatt.me/2014/09/10/isleaked-com-registered-2-days-before-gmail-leak-public/

Murky situation, I think.
 

Indeed....  (from http://cointelegraph.com/news/112494/nearly-5m-gmail-credentials-leaked-on-russian-bitcoin-security-forum):

Quote
Gmail users are advised to avoid entering their username and password into any website claiming to check whether their credentials have been compromised. This method known as the 'honeypot' aims to steal even more identities, and many websites have already started distributing phishing messages. Russian website isleaked.com claims to help people checking if their accounts have been compromised and is already being accused of being run by the very people who leaked the database as its domain name was registered on September 8.

If you are checking for your name in a leaked database, why on earth would you also enter your password?  You can see if your name is there through a legit "service".  Any service that proposes to check whether your password is indeed the one in the database should not be trusted!!

(IOW, avoid isleaked.com!)
o.O Isleaked provides the first two characters of the password which was leaked. It doesn't ask for a password.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!