Hackers Behind Theft Of 1.2 BILLION Passwords Start Attacks

Back in August, I reported that a bunch of Russian hackers assembled the biggest list of compromised login credentials ever seen: 1.2 billion accounts. At the time I said the following :

My advice? If you’re paranoid, change your passwords now. This article can help you with that. I personally am waiting to see who was affected and what those sites are doing to inform affected users.

Now, domain registrar Namecheap reports the hackers have begun using the list to try and access accounts:

Overnight, our intrusion detection systems alerted us to a much higher than normal load against our login systems. Upon investigation, we determined that the username and password data gathered from third party sites, likely the data identified by The Register (i.e. not Namecheap) is being used to try and gain access to Namecheap.com accounts.

The group behind this is using the stored usernames and passwords to simulate a web browser login through fake browser software. This software simulates the actual login process a user would use if they are using Firefox/Safari/Chrome to access their Namecheap account. The hackers are going through their username/password list and trying each and every one to try and get into Namecheap user accounts.

It is a safe bet that if Namecheap is getting attacked others are getting attacked as well. Thus now is a very good time to change your passwords for all of your Internet accounts. With a billion credentials to go through, they certainly haven’t had the chance to exploit them all yet. Thus not too late to protect yourself if you take action now. Also, keep in mind this little fact that Namecheap points out:

Our early investigation shows that those users who use the same password for their Namecheap account that are used on other websites are the ones who are vulnerable.

In other words, have different passwords for all your accounts to stay safe.

Leave a Reply

Discover more from The IT Nerd

Subscribe now to keep reading and get access to the full archive.

Continue reading