{"id":12665,"date":"2019-01-17T10:23:37","date_gmt":"2019-01-17T15:23:37","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/collection-numba-one\/12665\/"},"modified":"2019-11-15T15:22:36","modified_gmt":"2019-11-15T11:22:36","slug":"collection-numba-one","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/collection-numba-one\/12665\/","title":{"rendered":"My data was leaked in Collection #1. What should I do?"},"content":{"rendered":"<p>Today privacy and security expert Troy Hunt published a <a target=\"_blank\" href=\"https:\/\/www.troyhunt.com\/the-773-million-record-collection-1-data-reach\/\" rel=\"noopener noreferrer nofollow\">blogpost<\/a> regarding the so called Collection #1 \u2014 a large database containing more than 700 million unique e-mail addresses and more than 1,1 billion unique login-password pairs that surfaced on the Internet recently. Here we explain how to check if that affects you, and what can you do about it.<\/p>\n<p>Leaks and breaches happen \u2014 quite often, and sometimes those are big leaks and breaches. Malefactors collect the leaked information, creating databases with logins and passwords. Some of them try to add information from every leak to these databases, and that effort results in the creation of gigantic databases such as the one dubbed Collection #1, which has been analyzed by Troy Hunt.<\/p>\n<p>That is not just one monster leak (like the one that happened to Yahoo! with billions of users\u2019 credentials stolen) this is instead, a collection that compiles information from more than 2000 different leaks, some of them dating back to as far as 2008, while some are more recent.<\/p>\n<p>Surprisingly, Collection #1 does not seem to include logins and passwords from well-known leaks such as <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/linkedin-password-leak\/12146\/\" rel=\"noopener noreferrer nofollow\">LinkedIn leak that happened back in 2012<\/a> and both Yahoo breaches (here\u2019s <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/possible-yahoo-password-leak\/13047\/\" rel=\"noopener noreferrer nofollow\">our post about Yahoo breach #1<\/a>, here\u2019s <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/yahoo-hack-complexity-growing\/13082\/\" rel=\"noopener noreferrer nofollow\">another about breach #2<\/a>).<\/p>\n<h3>How to find out if I am affected by Collection #1?<\/h3>\n<p>To know if any of your credentials are on the database you can use <a target=\"_blank\" href=\"https:\/\/haveibeenpwned.com\/\" rel=\"noopener noreferrer nofollow\">haveibeenpwned.com<\/a>. Type-in the e-mail address that your accounts are associated with \u2014 and you will be able to see if that address was included in any of the leaked databases that haveibeenpwned.com is aware of.<\/p>\n<p>If your e-mail was a part of the Collection #1 \u2014 there will be an entry about that in haveibeenpwned. If it\u2019s not there \u2014 you\u2019re lucky, and there\u2019s nothing you need to do about this situation. But if it is there, that\u2019s where the tricky part begins.<\/p>\n<h3>What should I do about my account being mentioned in Collection #1 database?<\/h3>\n<p>If your e-mail is there, it\u2019s certainly a signal that you have to do something. However, the service won\u2019t tell you which of your accounts tied to this e-mail was breached. Was it an account on a cryptocurrency forum, or an online library account, or a cat-lovers-community account? With that said, there are two options now, depending on what whether you have <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/never-reuse-passwords-story\/24808\/\" rel=\"noopener noreferrer nofollow\">been using a single password on multiple services<\/a> or not.<\/p>\n<p>Option 1: you were using one password for multiple accounts associated with this e-mail address. Then life\u2019s going to be hard, because to ensure safety you\u2019ll have to go through all of these accounts and change passwords for each and every one. Don\u2019t forget that those passwords have to be long and unique. I think that, since you\u2019re used to remembering just one password, trying to memorize a bunch of new ones would be next to impossible, so it\u2019s probably a good idea to use a password manager.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n<p>Option 2: you were using unique passwords for accounts associated with this e-mail address. Good news, it\u2019s going to be somewhat easier then. Of course, you can also change all your passwords \u2014 but there\u2019s no need to do that. You can also try to find which of your passwords was exposed using another feature of haveibeenpwned called <a target=\"_blank\" href=\"https:\/\/haveibeenpwned.com\/Passwords\" rel=\"noopener noreferrer nofollow\">Pwned Passwords<\/a>.<\/p>\n<p>There you can type in a password for one of your accounts and see if it was mentioned in the Collection #1 database \u2014 either in plain text or as a <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/hashing\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">hash<\/a>. If you see that this or that password has surfaced on haveibeenpwned at least once, you\u2019d better change it. If not, then it\u2019s safe. Then proceed to another password.<\/p>\n<p>Of course, doing that means trusting haveibeenpwned, and most people have absolutely no reason to do that. That\u2019s why you can also paste there a SHA-1 hash of your password \u2014 and that\u2019ll give you the very same result as pasting the password itself. There are several online resources that make SHA-1 hashes for whatever information you feed to them (here, <a target=\"_blank\" href=\"https:\/\/www.google.com\/search?q=sha-1+hash+generator\" rel=\"noopener noreferrer nofollow\">I googled them for you<\/a>). That way you do not expose your password to haveibeenpwned, so there\u2019re no additional reasons to feel paranoid.<\/p>\n<h3>General advice on how to stay safe and mostly unaffected by data breaches<\/h3>\n<p>We have seen numerous leaks over the past few years, and it\u2019s safe to assume that a lot more are going to happen in the future. That\u2019s why new large databases such as Collection #1 will keep appearing from time to time, and malefactors will gladly use them to try breaking into people\u2019s accounts. To minimize the chances of being impacted by such breaches, I recommend you do the following:<\/p>\n<ul>\n<li>Use long and unique passwords for each and every account. That way if a service is breached, you\u2019ll need to change just one password.<\/li>\n<li>Enable two-factor authentication wherever it is possible. It will not allow hackers into your account even if they managed to obtain your login and password.<\/li>\n<li>Use security solutions such as <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a> that can warn you about recent breaches.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n<ul>\n<li>Use a password manager that can help you create many unique and strong passwords with no need to memorize them. Password managers can also help change the passwords faster whenever you need it. <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a> handles both of this tasks efficiently.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>A huge database of leaked e-mails and passwords surfaced in the Internet. Here\u2019s what you should do about it.<\/p>\n","protected":false},"author":675,"featured_media":12666,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1486],"tags":[1449,2004,1183,187],"class_list":{"0":"post-12665","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-breaches","10":"tag-collection-1","11":"tag-leaks","12":"tag-passwords"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/collection-numba-one\/12665\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/collection-numba-one\/15084\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/collection-numba-one\/17013\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/collection-numba-one\/15200\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/collection-numba-one\/13957\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/collection-numba-one\/17699\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/collection-numba-one\/16806\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/collection-numba-one\/22137\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/collection-numba-one\/5595\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/collection-numba-one\/25403\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/collection-numba-one\/11346\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/collection-numba-one\/11256\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/collection-numba-one\/10257\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/collection-numba-one\/18385\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/collection-numba-one\/22263\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/collection-numba-one\/23707\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/collection-numba-one\/17843\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/collection-numba-one\/21967\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/collection-numba-one\/21904\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/leaks\/","name":"leaks"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12665","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/675"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=12665"}],"version-history":[{"count":4,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12665\/revisions"}],"predecessor-version":[{"id":14533,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12665\/revisions\/14533"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/12666"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=12665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=12665"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=12665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}