Following the news that a hacker put 51 million file sharing accounts for sale on dark web, Beardsley, Security Research Manager at Rapid7 commented below.
Tod Beardsley, Security Research Manager at Rapid7:
“The iMesh breach from 2013 contains the usual bad passwords made familiar from many similar breaches over the years, such as “123456,” “password,” and “qwerty,” as well as site-specific passwords of “bearshare” and “music.” These common passwords imply that many of the user accounts associated with the service were throwaway accounts, where the users did not consider their accounts to be all that valuable.
Most people have about three to five passwords they reflexively choose for online services: one or two “personal” password for email and social media, an “important” password used for banking and finances, a “work” password for job or school, and a “throwaway” password such as the ones seen in the iMesh breach.
So, when compared to the LinkedIn corpus of credentials released in May, the iMesh corpus of passwords is not only smaller — 15 million versus the LinkedIn set of over 167 million — but of lower value to both attackers and researchers.
The one feature of the iMesh credential set that may be interesting to researchers is the inclusion of user IP addresses, along with usernames and passwords. IP addresses can be used to geolocate users, so a line of research to find out where in the world usernames and throwaway passwords are more popular might academically interesting.
However, trading in large sets of compromised credentials is legally touchy in most jurisdictions, even when those data sets are publicly available, so researchers should be cautious and seek legal advice before acquiring the data dumps for academic purposes.
Spammers are the most likely consumers of this data, since email addresses linked to IP addresses can give spammers a more accurate, geolocated dimension to their mailing lists. Email addresses and physical locations, after all, are difficult to change, so are more useful for spamming and phishing campaigns than the passwords might imply.”
[su_box title=”About Tod Beardsley” style=”noise” box_color=”#336588″][short_info id=’68446′ desc=”true” all=”false”][/su_box]
Most Commented Posts
2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Celebrating Data Privacy Day – 28th January 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Most Active Commenters
Recent Comments
Chat systems such as Slack and Teams need to be…
“This is a sophisticated phishing scam that will catch out…
“Cybersecurity is increasingly complex, in part, due to the interconnected…
“Unfortunately, time and time again we see NGOs, hospitals and…
As I have always said - it is verified trust…