21 Million Logins For Top 500 Firms Offered On The Dark Web

By   ISBuzz Team
Writer , Information Security Buzz | Oct 31, 2019 07:56 am PST

According to a recent report by ImmuniWeb, more than 21 million login credentials stolen from Fortune 500 companies have been found in various places on the dark web, many of them already cracked and available in plaintext form.

Most of them were from tech companies, closely followed by organisations in the financial industry. Entities in the healthcare, energy, telecommunications, retail, industrial, transport, aerospace and defence sectors are also on the list.

The researchers reveal a worrying statistic: “95% of the credentials contained unencrypted, or brute-forced and cracked by the attackers, plaintext passwords.”

Despite finding as many as 21 million login records, the report notes that only 4.9 million of them were unique, “suggesting that many users are using identical or similar passwords.”

Notify of
2 Expert Comments
Oldest Most Voted
Inline Feedbacks
View all comments
Craig Young
Craig Young , Principal Security Researcher
October 31, 2019 4:37 pm

This is an interesting glimpse into the inner-workings of underground criminal hacking markets. It illustrates just how easy it can be for an adversary to obtain a foothold into a target organization.

Some criminal hackers are very good at spear-fishing or breaching random websites, but may have little ability to directly monetize the information. (Some may be capable but prefer to minimize their risk exposure.) Others may specialize in escalating access within an organization, but have little capability in the way of initially obtaining access. Underground markets typically hosted on TOR allow these threat actors to collaborate with relative anonymity.

The best organizational defense against this class of threats is to employ proper multi-factor authentication. If a password alone is insufficient to gain access, password dumps become virtually worthless.

Last edited 4 years ago by Craig Young
Stuart Sharp
Stuart Sharp , VP of Solution Engineering
October 31, 2019 3:58 pm

The scariest takeaway from this discovery is that many companies will never know their cloud services have been compromised. It’s only when secret information comes to light in a public domain, or attackers attempt invoice payment redirection that the account compromise becomes obvious.

Unless MFA is in place, once login credentials are compromised, attackers can access highly sensitive company information. Organisations need to constantly audit cloud services and control access and protect authentication and authorisation using a combination of Privileged Access Management and MFA.

Last edited 4 years ago by Stuart Sharp

Recent Posts

Would love your thoughts, please comment.x