2 Million Stolen Facebook, Google, Twitter and Yahoo Passwords Found on Server in Netherlands

2 Million Stolen Facebook, Google, Twitter and Yahoo Passwords Found on Server in Netherlands

Hey “Facebookers,” “Google-ites,” “Tweeters” and “Yahoo-ers”! Does your account(s) represent one or some of the nearly two million social media accounts that were hacked over the past month?

2 Million Stolen Facebook, Google, Twitter and Yahoo Passwords Found on Server in NetherlandsAccording to a report that was released this week, this massive data breach was the result of keylogging software that was maliciously installed on an untold number of computers around the world. This virus has been capturing login credentials from more than 93,000 websites since October 21, 2013 and sending usernames and passwords to a Pony Bot server that was controlled by the hackers.

Researchers did track the hackers’ server, which took them to the Netherlands, but not before 318,000 Facebook accounts, 70,000 Google accounts, 22,000 Twitter accounts and 60,000 Yahoo accounts, among others, were breached.

And, to make matters worse, these weren’t amateur hackers! They knew enough to route the hacked data through a proxy server, making it impossible to track down infected computers. In fact, the hackers made it look as if there were 1,049,879 victims only in the Netherlands, even though the victimization is global.

Facebook allegedly told CNN Money that they have reset the passwords for all their compromised users; however, Google declined to comment while Yahoo did not provide a response.

Worried that your computer might be infected? One of the best things you can do is update your antivirus software and download the latest patches for all Internet browsers, Adobe and Java.

And, perhaps most importantly, change all your social media accounts’ passwords to a strong password that incorporates numbers, letters and special symbols in unlikely combinations, resisting the urge to use the same password for multiple accounts.

Photo courtesy of: Annette Shaff / Shutterstock.com

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3