Search
Close this search box.
Search
Close this search box.

Report: Hacker Uploads 10 Billion Passwords to Dark Web Forum

Hacker Uploads 10 Billion Passwords Dark Web

In a significant cybersecurity breach, the world’s most extensive collection of stolen passwords has been uploaded to an infamous crime marketplace where cybercriminals trade such credentials.

The hacker, operating under the pseudonym ‘ObamaCare,’ has posted a database allegedly containing nearly 10 billion unique passwords, according to security researchers from Cybernews. This massive leak poses a substantial threat to online security worldwide.

The RockYou2024 Password Database

Security researchers have identified the RockYou2024 database as the most extensive collection of stolen and leaked credentials ever seen on the BreachForums criminal underground forum. 

Containing approximately 9,948,575,739 unique passwords, all in plaintext format, the RockYou2024 compilation includes entries from an earlier database known as RockYou2021.

The RockYou2021 database contained 8.4 billion passwords, to which about 1.5 billion new passwords have been added, covering 2021 through 2024. Researchers estimate that the latest credentials file contains entries from around 4,000 significant databases of stolen credentials spanning at least two decades.

Concerns About Data Integrity

Despite the vast volume of data in the RockYou2024 leak, some cybersecurity experts have raised concerns about the data’s integrity. Some researchers have suggested that much of the data might be useless to cybercriminals. 

Responding to these concerns, Cybernews stated that their researchers had verified around 30 GB of the data, finding a 100% match with part of the RockYou dataset. 

However, they did not thoroughly investigate all the datasets. Cybernews emphasised that their primary goal is to inform the public about potential risks rather than providing the dataset to threat actors.

Brute Force and Credential Stuffing Implications

Credential stuffing attacks remain among the most common and successful methods for gaining unauthorised access to services and systems. Cybernews researchers warn that attackers could exploit the RockYou2024 password compilation to conduct brute-force attacks. 

Such attacks could target various online accounts, internet-facing cameras, and even industrial hardware. Combined with other leaked databases containing email addresses and credentials, RockYou2024 could lead to data breaches, financial fraud, and identity thefts.

Expert Opinions on the Leak

Cybersecurity experts argue that the sheer size of the RockYou2024 database might limit its usefulness to cybercriminals. Daniel Card, a cybersecurity consultant, pointed out that once databases reach a specific size, adding more passwords does not significantly enhance threat actors’ capabilities. 

Ian Thornton-Trump, the chief security information officer at Cyjax, agreed, suggesting that the vast data size might render it next to useless. 

However, both experts stressed the importance of multi-factor authentication (MFA) in mitigating such risks. Thornton-Trump even suggested that regulation might be necessary to mandate MFA for all logins on software-as-a-service platforms.

Steps to Protect Yourself

Responding to this massive leak, cybersecurity experts advise individuals to reassess their attitudes towards login security. Jake Moore, the global cybersecurity advisor for ESET, emphasised the importance of using unique passwords for every account. 

Moore recommended using password managers to generate and store complex passwords securely. He also urged users to implement MFA wherever possible to add an extra layer of security. 

Additionally, Cybernews offers an exposed passwords checker tool, allowing users to verify if any of their passwords are included in the RockYou2024 database.

The RockYou2024 leak, containing nearly 10 billion unique passwords, represents a significant cybersecurity threat. While some experts question the data’s integrity, the potential for credential stuffing and brute-force attacks remains high. 

Cybersecurity experts recommend using unique passwords, employing password managers, and implementing multi-factor authentication to mitigate these risks. By taking these precautions, individuals can better protect themselves against the growing threat of data breaches and identity theft.

 

The information is taken from Forbes and First Post


Subscribe to Our Newsletter

Related Articles

Top Trending

Elon Musk to Stay as Tesla CEO
Elon Musk to Stay as Tesla CEO for 5 More Years Despite Controversy
Justin Bieber Shuts Down Divorce Rumors
Justin Bieber Shuts Down Divorce Rumors: “Marrying Hailey Was Smart”
lady gaga sports emmy hold my hand super bowl
Lady Gaga Scores Sports Emmy for Super Bowl Hit ‘Hold My Hand’
Damien Chazelle Prison Drama
Cillian Murphy, Daniel Craig Join Damien Chazelle’s Prison Drama
Historical Events and Famous People Born on May 21
Discover the Historical Events and Famous People Born on May 21

LIFESTYLE

Clean Beauty Movement
How the Clean Beauty Movement Is Transforming Skincare in 2025
Gender Reveal Balloons
The Ultimate Guide to Gender Reveal Balloons: Colors, Styles, and Surprises
Best Places to Shop in Manchester
Shop 'Til You Drop: The Best Places to Shop in Manchester for Every Style
retirement cities in California
10 Best Retirement Cities in California for a Relaxed and Affordable Life
Mother's Day Around The World
Mother’s Day Traditions Around the World: Mother's Day 2025 Special

Entertainment

Justin Bieber Shuts Down Divorce Rumors
Justin Bieber Shuts Down Divorce Rumors: “Marrying Hailey Was Smart”
lady gaga sports emmy hold my hand super bowl
Lady Gaga Scores Sports Emmy for Super Bowl Hit ‘Hold My Hand’
Damien Chazelle Prison Drama
Cillian Murphy, Daniel Craig Join Damien Chazelle’s Prison Drama
Christina Yamamoto
Christina Yamamoto: The Life and Legacy of Jhené Aiko's Mother
Rhea Ripley Husband Revealed
Rhea Ripley Husband Revealed: The Story of Her Journey With Buddy Matthews

GAMING

Gaming Updates LCFModGeeks
Gaming Updates LCFModGeeks: Stay Ahead With Modded Software and Gamer Content
Gaming Communities
2025 Gaming Communities: Powering Creativity, Commerce, and Connection
Gaming Options Beyond Traditional Video Games
4 Types of Gaming Options That Go Beyond Traditional Video Games
Apple Blocks Fortnite on iOS
Fortnite Blocked on iOS in 2025 as Epic-Apple War Escalates
Best Mobile Games for Commuting Without Internet
Best Mobile Games for Commuting Without Internet

BUSINESS

Zach Bryan Crypto
Zach Bryan Crypto: Exploring The Crypto.com Arena in Los Angeles With Zach Bryan on Instagram
regeneron buys 23andme biotech acquisition
Regeneron Acquires 23andMe for $256M Amid Bankruptcy Woes
BNB vs Bitcoin
BNB: What makes it different from Bitcoin? 
3D Animation Company
When to Choose a 3D Animation Company Over 2D
Capital One Completes $35B Discover Deal
Capital One Completes $35B Discover Deal, Becomes Card Giant

TECHNOLOGY

Elon Musk to Stay as Tesla CEO
Elon Musk to Stay as Tesla CEO for 5 More Years Despite Controversy
Microsoft to Host Elon Musk’s Grok AI
Microsoft to Host Elon Musk’s Grok AI on Its Cloud Platform
Xiaomi chip investment
Xiaomi to Invest $7B in Chips to Boost Tech Independence
automotive industry trends
6 Trends Changing the Automotive Industry Forever
3D Animation Company
When to Choose a 3D Animation Company Over 2D

HEALTH

Joe Biden Faces Aggressive Prostate Cancer
Joe Biden Faces Aggressive Prostate Cancer, Family Reviewing Care
Stroke Patient May Be Nearing the End of Life
Recognizing When a Stroke Patient May Be Nearing the End of Life
PSA Test
For Men: Is the PSA Test Still Necessary?
Cattle Joint Supplements
Top Cattle Joint Supplements: Boosting Your Herd’s Health and Performance
Molar Implant Healing Timeline
The Healing Timeline After Getting Molar Implants