16 billion log-in information leaked from Google, Apple, etc

Google, Apple, Facebook and Telegram have leaked 16 billion pieces of user log-in information. Experts say that since log-in information of users of major platforms has been leaked en masse, cybercriminals are given an unprecedented opportunity to access their accounts, so it is necessary to change their account passwords. According to the Associated Press on Monday, Cyber News, a security news media outlet, said it recently discovered 30 datasets that summarize leaked login information. Each dataset contains vast amounts of login information, and the total number of leaked information amounts to 16 billion. These included the account passwords of users of popular platforms such as Google, Apple, and Facebook. The 16 billion pieces of leaked information are about twice the current population on Earth, and there is a possibility that more than one account has been leaked per user.

Cyber News said there may be duplicates of leaked information, adding, “It is impossible to say exactly how many people have actually been leaked.”

It turned out that the leaked login information was not stolen by a single hack targeting a specific company, but was collected through a number of incidents over a long period of time. It seems that the malicious code designed to steal personal information has contributed the most to the information theft.

It has also been confirmed that the information gathered in this way was distributed on the dark web (encrypted network), where cyber criminals are active. Experts advised that people should pay attention to “cyber hygiene” in situations where information leakage is frequent.

When a large-scale leak is confirmed, the first thing to do is to change passwords. After that, it is recommended not to use the same or similar login information on multiple sites, and if it is difficult to remember many passwords, it is recommended to use a password management tool or a passkey and add “multifactor authentication” (MFA) that goes through phone, email, or USB authentication keys.

JENNIFER KIM

US ASIA JOURNAL

spot_img

Latest Articles