{"id":24828,"date":"2024-07-08T03:10:05","date_gmt":"2024-07-08T11:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/07\/08\/news-18558\/"},"modified":"2024-07-08T03:10:05","modified_gmt":"2024-07-08T11:10:05","slug":"news-18558","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/07\/08\/news-18558\/","title":{"rendered":"&#8216;RockYou2024&#8217;: Nearly 10 billion passwords leaked online"},"content":{"rendered":"\n<p>On a popular hacking form, a user has leaked a file that contains 9,948,575,739 unique plaintext passwords. The list appears to be a compilation of passwords that were obtained during several old and more recent data breaches.<\/p>\n<p>The list is referred to as RockYou2024 because of its filename, rockyou.txt.<\/p>\n<p>To cybercriminals the list has some value because it contains real-world passwords. This means if an attacker tried this list of passwords to try to break into an account (known as a brute force attack) they&#8217;s be more likely to get in than just trying a list of any old letters and words. However, it&#8217;s highly unlikely that there are any services or websites that would allow anyone to try such an enormous number of passwords, so it&#8217;s really only useful to attackers who have stolen a password database and are trying to crack its passwords offline, on their own computer.<\/p>\n<p>Another possible use for cybercriminals is to combine the list with data from other breaches, such as combinations of usernames and passwords, which could get results if the password has been reused. If the cybercriminals also have a list that contains hashed passwords, they could even try to match the hash values of the passwords.<\/p>\n<p>Having the actual password makes an attack a lot easier than when you\u2019re trying a pass-the-hash attack, where an attacker tries to authenticate to a remote server or service by using the hash of a user\u2019s password. However, this only works on services that are vulnerable to pass-the-hash attacks, instead of requiring the associated plaintext password as is normally the case.<\/p>\n<p>To cut a long story short, if you don\u2019t reuse passwords and never use \u201csimple\u201d passwords, like single words, then this release should not concern you. If you use multi-factor authentication (MFA), and you should everywhere you can, there&#8217;s also no reason to worry about this.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-check-your-digital-footprint\">Check your digital footprint<\/h2>\n<p>Malwarebytes has a free tool for you to find out how much of your personal data has been exposed online. Submit your email address (it\u2019s best to give the one you most frequently use) to our free Digital Footprint scan and we\u2019ll give you a report and recommendations.<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-7ba16f0b-04e8-4679-9512-2f21a0971dcf\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/www.malwarebytes.com\/digital-footprint?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2c_pro_acq_fy25dfplaunch_171269600960&amp;utm_content=V1\"><\/a><a href=\"https:\/\/www.malwarebytes.com\/digital-footprint\">SCAN NOW<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n<p><strong>We don&#8217;t just report on threats &#8211; we help safeguard your entire digital identit<\/strong>y<\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Protect your\u2014and your family&#8217;s\u2014personal information by using <a href=\"https:\/\/www.malwarebytes.com\/identity-theft-protection\">identity protection<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/07\/rockyou2024-nearly-10-billion-passwords-leaked-online\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A list, known as RockYou2024, of almost 10 billion passwords has been released on a hacking forum. What are the dangers? <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10600,32,31619,31620,20665,5897],"class_list":["post-24828","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-mfa","tag-news","tag-pass-the-hash","tag-password-library","tag-password-reuse","tag-privacy"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24828"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24828\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}