2 Million Stolen Facebook, Google, Twitter and Yahoo Passwords Found on Server in Netherlands

2 Million Stolen Facebook, Google, Twitter and Yahoo Passwords Found on Server in Netherlands

Hey “Facebookers,” “Google-ites,” “Tweeters” and “Yahoo-ers”! Does your account(s) represent one or some of the nearly two million social media accounts that were hacked over the past month?

2 Million Stolen Facebook, Google, Twitter and Yahoo Passwords Found on Server in NetherlandsAccording to a report that was released this week, this massive data breach was the result of keylogging software that was maliciously installed on an untold number of computers around the world. This virus has been capturing login credentials from more than 93,000 websites since October 21, 2013 and sending usernames and passwords to a Pony Bot server that was controlled by the hackers.

Researchers did track the hackers’ server, which took them to the Netherlands, but not before 318,000 Facebook accounts, 70,000 Google accounts, 22,000 Twitter accounts and 60,000 Yahoo accounts, among others, were breached.

And, to make matters worse, these weren’t amateur hackers! They knew enough to route the hacked data through a proxy server, making it impossible to track down infected computers. In fact, the hackers made it look as if there were 1,049,879 victims only in the Netherlands, even though the victimization is global.

Facebook allegedly told CNN Money that they have reset the passwords for all their compromised users; however, Google declined to comment while Yahoo did not provide a response.

Worried that your computer might be infected? One of the best things you can do is update your antivirus software and download the latest patches for all Internet browsers, Adobe and Java.

And, perhaps most importantly, change all your social media accounts’ passwords to a strong password that incorporates numbers, letters and special symbols in unlikely combinations, resisting the urge to use the same password for multiple accounts.

Photo courtesy of: Annette Shaff / Shutterstock.com

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Enforcing Zero Trust in a Hybrid Work Environment

    Enforcing Zero Trust in a Hybrid Work Environment

    The effects of the pandemic have rippled across the business world like a meteor hitting a pond, creating a new plethora of challenges that incorporated into MBA curriculum for years to come. Read Now

  • First Responders Give NIST Their Communications Tech Wish Lists

    First Responders Give NIST Their Communications Tech Wish Lists

    Our first responders have spoken. An extensive research project conducted by experts at the National Institute of Standards and Technology (NIST) reveals what our country’s police, fire, emergency medical and 911 dispatch responders think about the communications technology they use on a regular basis and how they would like developers to improve it in the future. Read Now

  • Study Finds U.S. Enterprises Hit by Short-staffed Security Operations Centers

    Study Finds U.S. Enterprises Hit by Short-staffed Security Operations Centers

    ManageEngine, the enterprise IT management division of Zoho Corporation, recently announced results from its new study, Cloud Security Outlook 2023. The study found that enterprises have a limited number of analysts running their security operations centers (SOCs) and are deploying multiple tools in an attempt to address their cloud security challenges. Read Now

  • Report: More Than Half of Organizations Have Experienced an Insider Threat in the Past Year

    Report: More Than Half of Organizations Have Experienced an Insider Threat in the Past Year

    Gurucul, a provider of solutions in the Next Generation SIEM market, and Cybersecurity Insiders, a 600,000+ member online community for information security professionals, recently released its annual 2023 Insider Threat Report. Overall, results indicate insider threats are a top concern at organizations of all kinds; only 3% of respondents surveyed are not concerned with insider risk. Read Now

Featured Cybersecurity

New Products

  • BriefCam v6.0

    BriefCam v6.0

    BriefCam has released BriefCam v6.0, which introduces the new deployment option of a multi-site architecture. This enables businesses with multiple, distributed locations to view aggregate data from all remote sites to uncover trends across locations, optimize operations and boost real-time alerting and response – all while continuing to reap the benefits of BriefCam's powerful analytics platform for making video searchable, actionable and quantifiable. 3

  • XS4 Original+

    XS4 Original+

    The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability that enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. Compatible with the array of SALTO platform solutions including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution, and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE and NFC technology functionality. 3

  • Camden Door Controls CV-603 2 Door Bluetooth Access Control System

    Camden Door Controls CV-603 2 Door Bluetooth Access Control System

    his app-based system is designed to provide ‘best in class’ security of doors and gates, with up to 2,000 users. The intuitive programming app is Apple® and Android® compatible, with easy to use system set-up, user administration, downloadable audit trail and data back-up. 3