Have I Been Pwned adds 71 million emails from Naz.API stolen account list

The Naz.API dataset is a massive collection of 1 billion credentials compiled using credential stuffing lists and data stolen by information-stealing malware.

Credential stuffing lists are collections of login name and password pairs stolen from previous data breaches that are used to breach accounts on other sites.

Information-stealing malware attempts to steal a wide variety of data from an infected computer, including credentials saved in browsers, VPN clients, and FTP clients. This type of malware also attempts to steal SSH keys, credit cards, cookies, browsing history, and cryptocurrency wallets.

chaosppe,
@chaosppe@lemmy.world avatar

I’ve checked the list on mine, those are some really really old passwords… Must’ve been a long time ago.

bfg9k,
@bfg9k@lemmy.world avatar

How were you able to search the list? I can’t find it anywhere

chaosppe, (edited )
@chaosppe@lemmy.world avatar
bfg9k,
@bfg9k@lemmy.world avatar

Cheers mate.

Looks like my decision to start using keepass was a good idea, these are all very old passwords

swampdownloader, (edited )

So how do we access the list to see what got out?

Edit: search.0t.rocks has the db

camr_on,
@camr_on@lemmy.world avatar

haveibeenpwned.com

swampdownloader,

No i mean the dump to see which passwords are out

kn33,
space, (edited )

You can find a password checking utility on haveibeenpwned.com (the tool doesn’t send your password to the server, but only the first 5 characters of the hashed password, which is very safe). There are CLI tools on GitHub you can use to bulk test passwords. They also provide a downloadable list of hashes.

Alternatively, check if your password manager has a built-in tool for checking for passwords in known databases.

deweydecibel,

Alternatively, just start changing passwords, regardless if they’re in the breach or not. Prioritize the ones with financial information, then the ones with personal info, the ones you visit frequently versus some shitty site you visited once that made you make an account back in 2011, etc.

I know that’s a lot of accounts for some people but you don’t have to do them all at once. Go reset a password or two on a site today at lunch. Then do another one tomorrow. And a few the next day.

I actually remember reading about an app or feature on a password manager that would do something like this. Rather than bark at you to reset 100 different accounts at once, it would just give you 1 or 2 random accounts a day to go reset the password on.

deweydecibel,

Why on earth should people trust that site?

Pika, (edited )

What’s more insane is that some of those passwords in the lists are I still live intrusions that companies haven’t acted on, like for example my Dropbox password is there and that’s a new password that I just gave them a few months ago before I deleted my account

henfredemars,

A stern reminder that we should all use a password management tool and use unique, unrelated passwords with every service.

gregorum,

Yeah, I got an alert in my email last night about this. Now I have to go through a massive password reset. Fun!

PM_Your_Nudes_Please,

Take the opportunity to switch to a password manager, which will allow for unique passwords.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • privacy@lemmy.ml
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #