logo
Warning — 19 Billion Compromised Passwords Have Been Published Online

Warning — 19 Billion Compromised Passwords Have Been Published Online

Forbes06-05-2025
19 billion exposed passwords analyzed and it's not good news. getty
Update, May 6, 2025: This story, originally published May 3, has been updated with details of the SMS phishing threat posed by the Chinese Panda Shop cybercrime group, and an open letter to the cybersecurity industry asking why the phishing threat behind the stolen passwords epidemic has yet to be fixed.
In just the last few months, I have reported on confirmed lists of stolen passwords being made available on the dark web and in criminal forums that have risen from 800 million to 1.7 billion and even as high as 2.1 billion, mainly thanks to the rise and rise of infostealer malware attacks. But a new report has just blown even those shockingly large statistics out of the water with an analysis of 19 billion such passwords that are available online right now to any hackers who want to seek them out. The takeaway being that you need to take action now to prevent becoming a victim of the automatic password hacking machine epidemic. Forbes 884,000 Credit Cards Stolen With 13 Million Clicks By A Magic Cat By Davey Winder
Imagine having access to 19,030,305,929 passwords that were compromised by leaks and breaches over the course of 12 months from April 2024 and involving 200 security incidents. Imagine that only sources where email addresses were available for consumption alongside the stolen password were included in this massive database. Oh, and forget about including any of those word-list compilations, such as RockYou, that regularly do the rounds but are about as useful to a criminal hacker as a chocolate router. Finally, get to grips with the fact that this dataset only includes passwords that have become publicly available in criminal forums online. Once you digest all of this, you can appreciate how huge, in all senses of the word, this really is, especially to any hacker with criminal intent.
The analysis, published May 2 by the Cybernews research team, makes for truly eye-opening reading. It's so wide-ranging and security-scary in equal measure that it's hard to know where to start, so the beginning seems as good a place as any: password laziness and reuse. Of the 19,030,305,929 passwords that ended up exposed online, only 6% of them, or 1,143,815,266 if you like to be precise, were unique. Switch that around to 94% of them being reused across accounts and services, whether by the same or different people is moot, and you can see why the average cybercriminal gets very excited about the hacking potential such lists provide.
Now throw in that 42% of the passwords were short, way too short, being only 8-10 characters in length. That now opens up the hacking potential to brute force attacks as well as credential stuffing. Ah, yes, and it just keeps getting worse; 27% consisted of only lowercase letters and digits, no special characters or mixed case. Sigh. Forbes Google Says Critical Android 'No User Interaction' Attacks Underway By Davey Winder
According to Neringa Macijauskaitė, an information security researcher at Cybernews, 'the default password problem remains one of the most persistent and dangerous patterns in leaked credential datasets.' The analysis revealed that there were 53 million uses of admin and 56 million of password, for example. Changing these is one quick way to help mitigate against hackers, as Macijauskaitė said, 'attackers, too, prioritize them, making these passwords among the least secure.'
Not reusing your passwords, ever, not at all, is another prime mitigation recommendation. 'If you reuse passwords across multiple platforms, a breach in one system can compromise the security of other accounts, creating a domino effect,' Macijauskaitė warned. Meaning that even without any existing system compromise, attackers are able to exploit common password patterns in their hacking exploits. 'Attackers constantly harvest the latest credential dumps from exposed info-stealers and recently cracked hashes available publicly,' Macijauskaitė concluded. 'These fresh datasets enable waves of highly effective credential-stuffing attacks, often bypassing traditional security defenses.' Forbes Apple Passwords Attack Warning — Do Not Install This Update By Davey Winder An Open Letter To The Cybersecurity industry — Stopping The Stolen Passwords Problem
Paul Walsh, CEO of MetaCert and co-founder of the W3C Mobile Web Initiative in 2004, knows a thing or two about the problem of malicious messaging and has been involved in the creation of internet standards to protect against it. In conversation, Walsh told me that the latest national SMS phishing test carried out in March by MetaCert and including carriers such as AT&T, Verizon, T-Mobile and Boost Mobile, was as disappointing as it was expected. 'Every phishing message was still delivered,' Walsh told me, 'none were blocked, flagged, or rewritten.' This is, to say the least, given that the vast majority of phishing platforms are now developed to target mobile devices, overtaking email in this regard in 2024 according to ProofPoint. When you consider that phishing attacks, on whatever platform, are the starting point for most cyber attacks, it's no great leap to realize that the compromised passwords problem could be drastically reduced, if not stopped dead, by addressing the social engineering issue. Walsh has now written an open letter to the cybersecurity industry asking why the SMS phishing problem hasn't been solved ages ago?
'The cybersecurity industry has no shortage of experts in email security, endpoint protection, or network defense,' Walsh said, 'but when it comes to SMS infrastructure and security, there is a distinct lack of deep expertise.' His letter, therefore, is a call to action by security vendors who have 'built multi-billion-dollar businesses on stopping phishing in email and corporate networks,' Walsh said, 'yet the most trusted communication channel on the planet — SMS — remains an open, unprotected target.' Walsh demands that the same effort that has been made to address email security must now be made for the SMS vector because, he concluded, 'criminals have already moved in full force, and the industry is failing to respond.' Unless this happens, and happens with the full might of the cybersecurity industry behind it, I fear that I will be reporting about the compromise of user passwords for some time to come yet. Forbes 'Action Required Within 48 Hours' — PayPal Attack Warning Issued By Davey Winder From Passwords To Pandas
A new report by the security researcher team at Rescurity has confirmed just how dangerous the SMS phishing threat is. Having already established that the 'Smishing Triad' criminal gang has been operating since at least 2023, the Rescurity researchers have been keeping a close eye on the group of Chinese cybercriminals with very global ambitions. Using the by now de rigueur crime-as-a-service model, the Smishing Triad comprises multiple associates and leverages that scale to target victims all over the world.
Rescurity has reported how, according to the latest threat intelligence it has received, a single Chinese threat actor can distribute as many as 2 million phishing SMS text messages in a single day. The Smishing Triad, Rescurity said, 'could easily target up to 60,000,000 victims per month, or 720,000,000 per year,' or, to put it another way, every person in the U.S. — twice each year. The concern of Paul Walsh is brought sharply into focus when you realize that Smishing triad also uses network operator SMS gateways, alongside Google RCS and Apple's iMessage, to distribute their phishing attacks.
So, where does this story turn from passwords to pandas? In March, Rescurity identified yet another smishing kit that appeared to be using the same principles as the Smishing Triad service, and went by the name of Panda Shop. The Panda Shop kit has 'multiple Telegram channels and interactive bots to automate service delivery,' the Rescurity report said, providing distribution services primarily by way of Apple's iMessage and Android's RCS platforms. Furthermore, it would appear that the threat actors are purchasing, and purchasing in significant numbers, compromised Gmail accounts, as well as compromised Apple accounts, to help with the distribution efforts. Forbes Microsoft Issues June 1 Warning — Do Not Wait, Save Your Passwords Now By Davey Winder
'Like the Smishing Triad,' the Resecurity report confirmed, 'Panda Shop offers a customized smishing kit that can be deployed on any server.' The research team investigation concluded that it is highly likely that the Panda Shop group itself consists of some former Smishing Triad members who 'transitioned their operations under the new brand after being publicly shamed.' This theory is reinforced by the fact that the Panda Shop phishing kit structure, along with various scripting scenarios that have been analyzed by Resecurity, 'mimic the same product but include specific improvements and new supported templates.'
The scale of the smishing activity from Chinese threats actors, including Smishing Triad and now Panda Shop is, Resucurity warned, impressive. 'The spectrum of the crimes conducted due to smishing ranges from traditional carding and NFC-enabled fraud to money laundering chains, enabling fraudsters to process stolen funds,' Rescurity researchers said. There's more than just your passwords at stake from smishing or any phishing attacks; there's all the data that sits beyond it and the implications that the compromise of that and access to other services can have. 'Based on Resecurity's engagements with financial institutions globally,' the report concluded, 'this activity generates millions in losses annually.'
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Swissquote Ordered by Regulator to Reduce Suspicious Activity
Swissquote Ordered by Regulator to Reduce Suspicious Activity

Bloomberg

time43 minutes ago

  • Bloomberg

Swissquote Ordered by Regulator to Reduce Suspicious Activity

Switzerland's financial watchdog has stepped up pressure on trading platform Swissquote Group Holding SA to do more to curb suspicious activity amid a surge in attempted fraud and hacks. In an annual assessment letter earlier this year, Finma told Switzerland's biggest consumer trading platform to do more to reduce the number of reports it has to submit to the country's money laundering reporting office, according to Swissquote CEO Marc Buerki.

Secure Your Gmail Now As Google Warns Of Password Attacks
Secure Your Gmail Now As Google Warns Of Password Attacks

Forbes

timean hour ago

  • Forbes

Secure Your Gmail Now As Google Warns Of Password Attacks

Secure your Gmail account now as attacks confirmed. The Google Threat Intelligence Group has warned that UNC6293, a Russian state-sponsored hacking unit, is targeting Gmail users in a recent password-stealing threat campaign affecting users of the world's most popular email platform. This is just one of a string of attacks that stretch back over the years, but have now evolved to include sophisticated 2FA bypass threats, phishing attacks that appear to originate from Google itself, and highly believed hybrid attacks involving human hackers alongside AI-powered ones. Although Gmail is not the only email platform plagued by security threats, it's the large user base and the access to data that a Gmail account password provides that make it such an attractive target. Here's what you need to do to secure yours. How To Secure Your Gmail Account Against Password Hackers Gabby Roncone and Wesley Shields, from the Google Threat Intelligence Group, have published an in-depth report that confirmed one critical attack campaign, executed by Russian state-sponsored hackers who are part of the UNC6293 group, targeted Gmail users with lures designed to persuade them to create an application specific password to allow a third-party app access to their Gmail accounts. One such attack is described on LinkedIn by Kier Giles, a respected researcher of Russian power projections, who said, "Several of my email accounts have been targeted with a sophisticated account takeover that involved impersonating the U.S. State Department.' In mitigation of the UNC6293 application specific password attacks, the Google Threat Intelligence Group said that users have complete control over their ASP's and a notification is sent as soon as one is created to the Gmail account involved and any devices signed in using it, 'to ensure the user intended to enable this form of authentication.' Of course, these attacks involve a lot of social engineering, so protections need to run further than this, which is why Google operates the Advanced Protection Program 'intended for individuals at high risk of targeted attacks and exposure to other serious threats.' Using the APP, prevents an account from creating an ASP at all. More broadly, Gmail users are advised to take action to prevent Gmail hack attacks as follows:

SparkKitty mobile malware targets Android and iPhone
SparkKitty mobile malware targets Android and iPhone

Fox News

timean hour ago

  • Fox News

SparkKitty mobile malware targets Android and iPhone

Bad actors constantly seek every bit of personal information they can get, from your phone number to your government ID. Now, a new threat targets both Android and iPhone users: SparkKitty, a powerful mobile malware strain that scans private photos to steal cryptocurrency recovery phrases and other sensitive data. Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide — free when you join my Researchers at cybersecurity firm Kaspersky recently identified SparkKitty. This malware appears to succeed SparkCat, a campaign first reported earlier this year that used optical character recognition (OCR) to extract sensitive data from images, including crypto recovery phrases. SparkKitty goes even further than SparkCat. According to Kaspersky, SparkKitty uploads images from infected phones without discrimination. This tactic exposes not just wallet data but also any personal or sensitive photos stored on the device. While the main target seems to be crypto seed phrases, criminals could use other images for extortion or malicious purposes. Kaspersky researchers report that SparkKitty has operated since at least February 2024. Attackers distributed it through both official and unofficial channels, including Google Play and the Apple App Store. Kaspersky found SparkKitty embedded in several apps, including one called 币coin on iOS and another called SOEX on Android. Both apps are no longer available in their respective stores. SOEX, a messaging app with cryptocurrency-related features, reached more than 10,000 downloads from the Google Play Store before its removal. On iOS, attackers deliver the malware through fake software frameworks or enterprise provisioning profiles, often disguised as legitimate components. Once installed, SparkKitty uses a method native to Apple's Objective-C programming language to run as soon as the app launches. It checks the app's internal configuration files to decide whether to execute, then quietly starts monitoring the user's photo library. On Android, SparkKitty hides in apps written in Java or Kotlin and sometimes uses malicious Xposed or LSPosed modules. It activates when the app launches or after a specific screen opens. The malware then decrypts a configuration file from a remote server and begins uploading images, device metadata, and identifiers. Unlike traditional spyware, SparkKitty focuses on photos, especially those containing cryptocurrency recovery phrases, wallet screenshots, IDs, or sensitive documents. Instead of just monitoring activity, SparkKitty uploads images in bulk. This approach makes it easy for criminals to sift through and extract valuable personal data. 1) Stick to trusted developers: Avoid downloading obscure apps, especially if they have few reviews or downloads. Always check the developer's name and history before installing anything. 2) Review app permissions: Be cautious of apps that request access to your photos, messages, or files without a clear reason. If something feels off, deny the permission or uninstall the app. 3) Keep your device updated: Install system and security updates as soon as they are available. These updates often patch vulnerabilities that malware can exploit. 4) Use mobile security software: The best way to safeguard yourself from malicious software is to have strong antivirus software installed on all your devices. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices by visiting Both Apple and Google removed the identified apps after being alerted, but questions remain about how SparkKitty bypassed their app review processes in the first place. As app stores grow, both in volume and complexity, the tools used to screen them will need to evolve at the same pace. Otherwise, incidents like this one will continue to slip through the cracks. Do you think Google and Apple are doing enough to protect users from mobile malware and evolving security threats? Let us know by writing to us at Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my Copyright 2025 All rights reserved.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store