{"id":25095,"date":"2024-08-21T05:10:32","date_gmt":"2024-08-21T13:10:32","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/08\/21\/news-18825\/"},"modified":"2024-08-21T05:10:32","modified_gmt":"2024-08-21T13:10:32","slug":"news-18825","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/08\/21\/news-18825\/","title":{"rendered":"National Public Data leaked passwords online"},"content":{"rendered":"\n<p>Earlier this month, a huge trove of data from scraping service National Public Data was <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/08\/stolen-data-from-scraping-service-national-public-data-leaked-online\">posted online<\/a>. The dump made international headlines because it included data on hundreds of millions of people, and included Social Security Numbers.<\/p>\n<p>As if that wasn&#8217;t bad enough, <a href=\"https:\/\/krebsonsecurity.com\/2024\/08\/national-public-data-published-its-own-passwords\/\">KrebsOnSecurity<\/a> is now reporting on another National Public Data company found hosting a file online that included the usernames and passwords for the back-end of its website, including for the site\u2019s administrator.<\/p>\n<p>The website of this company, Records Check, is hosted at recordscheck.net, and is very similar to nationalpublicdata.com with identical login pages. The publicly-accessible file, which has now been taken offline, showed that all RecordsCheck users were given the same 6-character password with instructions to change that password. Which many failed to do.<\/p>\n<p>National Public Data\u2019s founder, Salvatore \u201cSal\u201d Verini told Krebs that the exposed file has been removed from the company\u2019s website, and that the entire site will cease operations \u201cin the next week or so.\u201d<\/p>\n<p>But that&#8217;s a bit too little too late. As bad as we feel about companies like these scraping our data, it&#8217;s even worse to see how carelessly they handle our personal information.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-different\">Different<\/h2>\n<p>Back to the original NPD data dump, we now know a lot more now about this database.<\/p>\n<p>Allegedly, the 277 GB set of data contained Social Security numbers and other sensitive data of about 2.9 billion people. That seems a stretch, so we looked into that.<\/p>\n<p>The estimates from our researchers say that it contains 272 million unique social security numbers. That could mean that the majority of US citizens could be affected, although numerous people confirmed to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-leak-27-billion-data-records-with-social-security-numbers\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">BleepingComputer<\/a> that it also included information about deceased relatives.<\/p>\n<p>There are a few aspects in this case that make it very different from other data breaches.<\/p>\n<p>For one, the data was \u201cscraped,\u201d meaning it was pulled from various sources and combined in a large database. So that means the data was already \u201cout there.\u201d Combining data sets often leads to duplicate records, for example, the same person but living at a different address will be listed twice.<\/p>\n<p>However, combining the data in such a large database does allows those with access to amass a huge amount of data about each person.<\/p>\n<p>Second, because of the scraping, there is no direct link between the breached entity and the people whose data is in the leaked database. Normally, businesses will inform their affected customers about what happened, offer credit monitoring services, and let them know what exactly was stolen.<\/p>\n<p>Depending on the outcome of a <a href=\"https:\/\/www.bloomberglaw.com\/public\/desktop\/document\/HofmannvJericoPicturesIncDocketNo024cv61383SDFlaAug012024CourtDoc?doc_id=X6S27DVM6H69DSQO6MTRAQRIVBS\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">complaint<\/a>&nbsp;filed in the US District Court for the Southern District of Florida some of this might still happen, but it\u2019s unlikely that it will be anywhere near what a company worried about it\u2019s customers might be willing to do.<\/p>\n<p>National Public Data has set up a <a href=\"https:\/\/nationalpublicdata.com\/Breach.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">website<\/a> (only accessible with a US IP address, so from outside the US you may need to use a <a href=\"https:\/\/www.malwarebytes.com\/vpn\">VPN<\/a>) about the breach. According to that website:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cThe information that was suspected of being breached contained name, email address, phone number, social security number, and mailing address(es).\u201d<\/p>\n<\/blockquote>\n<h2 class=\"wp-block-heading\" id=\"h-protecting-yourself-after-a-data-breach\">Protecting yourself after a data breach<\/h2>\n<p>There are some actions you can take if you are, or suspect you may have been, the <a href=\"https:\/\/www.malwarebytes.com\/blog\/personal\/2023\/09\/involved-in-a-data-breach-heres-what-you-need-to-know\">victim of a data breach<\/a>.<\/p>\n<ul>\n<li><strong>Check the vendor&#8217;s advice.<\/strong> Every breach is different, so check with the vendor to find out what&#8217;s happened, and follow any specific advice they offer.<\/li>\n<li><strong>Change your password.<\/strong> You can make a stolen password useless to thieves by changing it. Choose a&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.malwarebytes.com\/computer\/how-to-create-a-strong-password\" target=\"_blank\">strong password<\/a>&nbsp;that you don&#8217;t use for anything else. Better yet, let a&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.malwarebytes.com\/what-is-password-manager\" target=\"_blank\">password manager<\/a>&nbsp;choose one for you.<\/li>\n<li><strong>Enable two-factor authentication (2FA).<\/strong> If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\" target=\"_blank\">two-factor authentication (2FA)<\/a>&nbsp;can be phished just as easily as a password. 2FA that relies on a FIDO2 device can\u2019t be phished.<\/li>\n<li><strong>Watch out for fake vendors.<\/strong> The thieves may contact you posing as the vendor. Check the vendor website to see if they are contacting victims, and verify the&nbsp;identity of anyone who contacts you&nbsp;using a different communication channel.<\/li>\n<li><strong>Take your time.<\/strong> Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.<\/li>\n<li><strong>Consider not storing your card details<\/strong>. It&#8217;s definitely more convenient to get sites to remember your card details for you, but we highly recommend not storing that information on websites.<\/li>\n<li><strong>Set up identity monitoring.<\/strong> <a href=\"https:\/\/go.cyrus.app\/MN4j\/fkkekmw9\" target=\"_blank\" rel=\"noreferrer noopener\">Identity monitoring<\/a> alerts you if your personal information is found being traded illegally online, and helps you recover after.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"h-check-your-digital-footprint\">Check your digital footprint<\/h2>\n<p>If you want to find out what personal data of yours has been exposed online, you can use our&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/digital-footprint\">free Digital Footprint scan<\/a>. Fill in the email address you\u2019re curious about (it\u2019s best to submit the one you most frequently use) and we\u2019ll send you a free report.<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-7ba16f0b-04e8-4679-9512-2f21a0971dcf\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/www.malwarebytes.com\/digital-footprint?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2c_pro_acq_fy25dfplaunch_171269600960&amp;utm_content=V1\"><\/a><a href=\"https:\/\/www.malwarebytes.com\/digital-footprint\">SCAN NOW<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/08\/national-public-data-leaked-passwords-online\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The National Public Data breach includes the Social Security Numbers of many US citizens. Find out about yours. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[31764,32,5897,28448,14540,14541],"class_list":["post-25095","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-national-public-data","tag-news","tag-privacy","tag-scraped","tag-social-security-numbers","tag-ssn"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25095"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25095\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}