Nearly 10 billion passwords stolen by hackers — how to protect yourself (2024)

Nearly 10 billion passwords stolen by hackers — how to protect yourself (1)

One of the biggest password compilations ever was leaked today. The file, which is titled RockYou2024.txt, contains a massive 9,948,575,739 unique plaintext passwords. It was posted by a forum user that goes by the name of "ObamaCare."

As reported by Cybernews (via TechTadar), the RockYou2024.txt file contains passwords stolen in a mix of old and new attacks. Three years ago, the RockYou2021 password compilation exposed 8.4 billion plain text passwords. Today's leak adds an extra 1.5 billion passwords.

What can criminals do with the RockYou2024 leak?

Nearly 10 billion passwords stolen by hackers — how to protect yourself (2)

Like many data leaks, the RockYou2024 database lets potential criminals conduct brute-force attacks and get unauthorized access to online accounts exposed in the leak.

Brute-force refers to a technique hackers use to crack passwords by writing a program that automatically tries every single combination of letters and numbers. A simple password like "1234" can be cracked within seconds by a basic brute-force attack.

Additionally, the RockYou2024 leak can also make it easy for attackers to use a technique called credential stuffing. Credential stuffing is a form of brute-force password attack that takes advantage of people who recycle their login information, also known as password reuse.

In a credential-stuffing attack, cyber criminals take usernames and passwords that have been leaked in a data breach and start plugging them into other websites in the hopes of accessing poorly secured accounts.

It's similar to a brute-force attack in that cybercriminals will try multiple sets of credentials on multiple accounts. Fortunately, there are some steps you can take right now to protect yourself.

Sign up to get the BEST of Tom’s Guide direct to your inbox.

Upgrade your life with a daily dose of the biggest tech news, lifestyle hacks and our curated analysis. Be the first to know about cutting-edge gadgets and the hottest deals.

How to safely create and manage passwords

No one wants to have their passwords exposed online. Fortunately, Cybernews has created its own data leak checker to see if your credentials have been exposed. Likewise, the popular data leak site HaveIBeenPwned can show you if your records have been leaked.

Going forward, one of the biggest steps you can take to protect yourself is to always use strong, complex and unique passwords for all of your online accounts. While you can come up with passwords on your own, the best password managers can do this for you and store them securely in one place. Likewise, the best identity theft protection services can come in handy if you need to recover a stolen identity or money lost to fraud.

Nearly 10 billion passwords stolen by hackers — how to protect yourself (3)

Louis Ramirez

As deals editor-in-chief at Tom’s Guide, Louis is constantly looking for ways to avoid paying full price for the latest gadgets, appliances, and apparel. With over 10 years of deals-hunting experience, Louis price checksagainst multiple retailers and searches high and low for the best deals to bring readers. He's also always on the look out for the best coupon codes to use when shopping. A born-and-bred New Yorker, Louis is also an avid swimmer and marathoner. His work has appeared on Gizmodo, CNET, and Time Out New York.

More about online security

Hackers could ruin your next cookout if you own one of these smart grills — update right nowDownloading this popular new browser could leave your Mac with a nasty malware infection — don’t fall for this

Latest

Samsung's offering up to $1,200 for Galaxy Z Fold 6 trade-ins plus a ton of free perks
See more latest►

No comments yetComment from the forums

    Most Popular
    Uruguay vs Brazil live stream: How to watch Copa America 2024
    Colombia vs Panama live stream: How to watch Copa America 2024 today
    How to watch Samsung Galaxy Unpacked Summer 2024 online live — Galaxy Z Fold 6, Watch Ultra, Galaxy Ring and more
    Apple tipped to be working on new Apple TV models and a mysterious 'Home Accessory'
    Netherlands vs Turkiye live stream: How to watch Euro 2024 online and for free
    Nike discontinues self-lacing 'Back to the Future' shoes and removes app from App Store, Google Play
    Unreleased Samsung Galaxy Buds 3 Pro appear in the wild — here's how they look
    South Africa vs Ireland live stream: How to watch rugby Summer Internationals 2024 online and on TV
    Apple Intelligence and Galaxy AI to help spark AI smartphone explosion — growing 364% in 2024
    England vs Switzerland live stream: How to watch Euro 2024 online and for free today, team news
    How to watch Shark Week 2024 online right now: Full schedule, channels and more
    Nearly 10 billion passwords stolen by hackers — how to protect yourself (2024)

    FAQs

    What is easiest way to protect against hackers? ›

    Protecting Online Accounts
    • Delete suspicious emails. It is best to delete spam or dubious-looking emails without opening them. ...
    • Use secure devices. ...
    • Create strong passwords. ...
    • Use multifactor authentication on your accounts. ...
    • Sign up for account alerts.

    What do hackers use to protect themselves? ›

    Two-factor authentication is often used to keep hackers from accessing your personal information. But for hackers, using their real contact information is too risky. Hackers use burner phones, multiple dummy email addresses, and truly encrypted messaging services like Signal to maintain privacy.

    What are the three most common passwords for hackers? ›

    NordPass
    Rank2021
    1123456
    2123456789
    312345
    4qwerty
    16 more rows

    How do hackers get your personal information? ›

    So what techniques do hackers use to steal information? Hackers will often use multiple techniques at once to steal your information. These methods include phishing, fake WAP's (Wireless Access Point), waterhole attacks, brute forcing, bait & switch, and clickjacking.

    What is the best defense against password attacks? ›

    Implement Multi-Factor Authentication

    Multi-factor authentication (MFA), by incorporating factors such as endpoint or biometrics, authenticator applications, protects accounts against password cracking tools and guessing attacks by requiring an extra step to provide identity confidence for authentication.

    What do hackers use the most? ›

    Email Phishing is one of the most common hacking tools. Ironically, most of us are aware of email phishing, but we still fall prey to these attacks. Essentially, hackers target users by sending an email that looks to be coming from a legitimate source.

    Who protects people from hackers? ›

    Cybersecurity and Infrastructure Security Agency (CISA)

    CISA is at the center of the exchange of cyber defense information and defensive operational collaboration among the federal government, and state, local, tribal and territorial (SLTT) governments, the private sector, and international partners.

    What is the most overused password in the world? ›

    Something simple, short and predictable. Astonishingly, those are also the characteristics of the world's most common online password, which is 123456, according to online password management company NordPass.

    What is the most hacked account? ›

    Facebook accounts are the most hacked accounts on the internet in the United States, according to new research by VPN Central.

    How do hackers figure out your password? ›

    Sometimes, the answer is as simple as trial and error. Brute-force attacks use software to guess at user passwords over and over until a match is found. Rather than stealing or purchasing the password, the hacker obtains it through computer-assisted guesswork made more effective by weak or reused passwords.

    What information do hackers want the most? ›

    Personal data

    While passport information sells for the most amount of money, Social Security numbers are the most valuable to hackers, as these can be used for tax fraud, opening credit accounts, and other malicious activities.

    Which of the following is most heavily attacked by hackers? ›

    This article explores six of the most vulnerable industries and the type of cyber threats and hacking they're up against.
    1. Small Businesses. ...
    2. Healthcare. ...
    3. Government Agencies. ...
    4. Financial Institutions. ...
    5. Education. ...
    6. Energy and Utility Companies.
    Aug 3, 2021

    Which is safest against hackers? ›

    17 Ways To Prevent Hacking and Protect Yourself From Hackers
    • Use strong and unique passwords.
    • Store your passwords in a password manager.
    • Enable two-factor authentication (2FA)
    • Use an authenticator app for 2FA.
    • Make sure you have a secure backup email and phone number.
    • Learn to spot the warning signs of a phishing scam.
    Nov 27, 2023

    What protects your system from hackers? ›

    Firewalls. A firewall is a software program or piece of hardware that blocks hackers from entering and using your computer. Hackers search the internet the way some telemarketers automatically dial random phone numbers.

    What is the most likely way to get hacked? ›

    Weak Passwords

    Yes, it's easier to use your dog's name as a password every time you need one. However, when you realize that 80% of cyber attacks come from weak passwords, you should be convinced that putting a little extra effort in here is well worth it. We can't say this enough: strong passwords matter!

    Top Articles
    Is Wellsbury From 'Ginny & Georgia' a Real Place?
    "Ginny & Georgia"-Start von Staffel 3 verzögert sich! Wann geht's endlich weiter?
    Tales From The Crib Keeper 14
    Hotels Near Okun Fieldhouse Shawnee Ks
    Petty Bourgeoisie | Encyclopedia.com
    Random Animal Hybrid Generator Wheel
    Savannah Rae Demers Fanfix
    "Rainbow Family" will im Harz bleiben: Hippie-Camp bis Anfang September geplant
    Coolmathgames.comool Math
    24 Hour Lock Up Knoxville Tn
    Oak Ridge Multibillion Dollar Nuclear Project: Largest Investment in Tennessee History
    Wat is 7x7? De gouden regel voor uw PowerPoint-presentatie
    92801 Sales Tax
    El Puerto Harrisonville Mo Menu
    Mr Seconds Geneseo Ny
    Food Universe Near Me Circular
    Schwan's Expiration Date Decoder
    Chula Vista Tv Listings
    Craigslist Ct Pets
    Rick Steves Forum
    Forest | Definition, Ecology, Types, Trees, Examples, & Facts
    Bbc Weather Boca Raton
    Clayton Grimm Siblings
    Excuse Me This Is My Room Comic
    Runnings Milwaukee Tool Sale
    Anvil In Shattrath
    Bay State Neurology
    Fortnite Fap Hero
    Showcameips
    Urgent Care Near Flamingo Crossings Village
    Used Zero Turn Mowers | Shop Used Zero Turn Mowers for Sale - GSA Equipment
    Shannon Ray Booty
    Banning Beaumont Patch
    Wjar Channel 10 Providence
    Wwwcraigs List .Com
    Embu village mines precious coltan for years 'without knowing its value’
    Whatcom County Food Handlers Permit
    Tuw Academic Calendar
    Erskine Plus Portal
    2Nd Chance Apartments In Richmond Va
    Chloe Dicarlo
    Ihop Ralph Ave
    My Scheduler Hca Cloud
    About Baptist Health - Baptist Health
    Tamu Registration Worksheet
    The Little Mermaid (2023) | Rotten Tomatoes
    Hexanaut.io – Jouez en ligne sur Coolmath Games
    Currently Confined Coles County
    Ascensionpress Com Login
    J&J News Bluefield Wv
    Hurst Scott Funeral Home Obituaries Richlands Virginia
    Hollyday Med Spa Prairie Village
    Latest Posts
    Article information

    Author: Golda Nolan II

    Last Updated:

    Views: 5381

    Rating: 4.8 / 5 (78 voted)

    Reviews: 93% of readers found this page helpful

    Author information

    Name: Golda Nolan II

    Birthday: 1998-05-14

    Address: Suite 369 9754 Roberts Pines, West Benitaburgh, NM 69180-7958

    Phone: +522993866487

    Job: Sales Executive

    Hobby: Worldbuilding, Shopping, Quilting, Cooking, Homebrewing, Leather crafting, Pet

    Introduction: My name is Golda Nolan II, I am a thoughtful, clever, cute, jolly, brave, powerful, splendid person who loves writing and wants to share my knowledge and understanding with you.