{"id":2616,"date":"2013-12-05T12:20:25","date_gmt":"2013-12-05T17:20:25","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=2616"},"modified":"2020-02-26T18:58:02","modified_gmt":"2020-02-26T14:58:02","slug":"two-million-passwords-have-been-stolen-what-about-yours","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/two-million-passwords-have-been-stolen-what-about-yours\/2616\/","title":{"rendered":"Two million passwords have been stolen. What about yours?"},"content":{"rendered":"<p>Any of your passwords, be it for email, social networks or online banking hold value for cybercriminals, because almost any stolen account can be used in fraud schemes. It\u2019s no wonder password theft is so widespread nowadays. Sometimes thieves steal passwords <a href=\"https:\/\/www.kaspersky.com\/blog\/10-worst-password-ideas-as-seen-in-the-adobe-hack\/\" target=\"_blank\" rel=\"noopener nofollow\">directly from major company\u2019s servers<\/a>, and sometimes they steal from end users\u2019 machines. Security researchers recently discovered a major database <a href=\"https:\/\/threatpost.com\/pony-botnet-controller-holds-2-million-stolen-and-weak-credentials\/103096\" target=\"_blank\" rel=\"noopener nofollow\">containing about two million various passwords<\/a>, collected by Pony botnet. The malware associated with this botnet infects a computer, gathers all available (saved) passwords from web browsers, email and FTP clients, and sends all data to cybercriminals, using proxy servers to hide a final destination.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/12\/05111004\/2mil-1.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3298\" alt=\"2mil\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/12\/05111004\/2mil-1.jpeg\" width=\"640\" height=\"480\"><\/a><\/p>\n<p>In this most recent hack, criminals gathered passwords from the following major services: Facebook, Yahoo, Gmail, Twitter, Linkedin and Russian-specific social networks Odnoklassniki and Vkontakte.<\/p>\n<p>Considering the large scale of this incident, users of the above mentioned services should think about whether or not their passwords are okay.<\/p>\n<p>In order to have your Gmail or Facebook account stolen, it\u2019s not necessary to become a target for a malware attack. Maybe you\u2019ve just checked your inbox using your friend\u2019s PC or a public terminal in a hotel or an airport. If this PC was infected, one of your passwords is in the possession of a hacker now. This could be quite unpleasant by itself, but the problem will become even worse if you have a habit of re-using the same password for multiple online services. It doesn\u2019t take a genius to try to obtain the login and password combination alex@gmail-com \/ 123456 to log into Facebook or Twitter. Unfortunately, this works way too often. According to a survey conducted by B2B International this summer, 39% of users use only a handful of passwords to access all or their accounts, i.e. the <a href=\"https:\/\/www.kaspersky.com\/blog\/infographic-password-protection\/\" target=\"_blank\" rel=\"noopener nofollow\">same password is used on multiple sites<\/a>.<\/p>\n<div class=\"pullquote\">According to a survey conducted by B2B International this summer, 39% of users use only a handful of passwords to access all or their accounts, i.e. the same password is used on multiple sites.<\/div>\n<p>As password theft happens more often, this habit has become even more dangerous, especially if you consider that your daily routine now includes persistent access to financial transactions \u2013 from classical online banking to fund transfers using Gmail attachments. That\u2019s why a seemingly innocent Twitter password theft might eventually lead to the loss of real money.<\/p>\n<p>To sort this out, all of us must take one important step \u2013 change your old passwords, making sure that each online account is protected with its own, unique password. If you have a hard time remembering multiple passwords, you can use special software like <a href=\"https:\/\/www.kaspersky.com\/password-manager\" target=\"_blank\" rel=\"noopener nofollow\">password manager<\/a>, which is able to store your passwords in encrypted form. The luxury of re-using the same password over and over again is now a part of \u201cthe good old Internet times\u201d. To avoid further password theft, follow the advice of Aleks Gostev, Chief Security Expert at Kaspersky Lab:<\/p>\n<ul>\n<li><b>Use a robust <\/b><a href=\"https:\/\/www.kaspersky.com\/advert\/free-trials\/multi-device-security?redef=1&amp;THRU&amp;reseller=blog_en-global\" target=\"_blank\" rel=\"noopener nofollow\"><b>antivirus<\/b><\/a><b>.<\/b><\/li>\n<li><b>Update software on a regular basis<\/b>. Pay special attention to updating Windows, web browser, popular apps used to view PDF, Flash, Java applets.<\/li>\n<li>Always <b>remember safety<\/b>. If a user gets a link from a friend who never sends him anything, or the friend sends something that the user would never expect to receive from him\/her, this should raise suspicion. It\u2019s better to ask the friend personally, and thus find out whether his\/her account was hacked or not.<\/li>\n<li>One should <b>pay attention to links<\/b> \u2013 a domain name of a popular web-resource may contain some symbols, or the letters may be different. This is a first sign of being redirected to a malicious phishing web-site. <b>Avoid<\/b> accepting <b>friend requests from people you don\u2019t know<\/b>, and don\u2019t follow suspicious links in general<b>.<\/b><\/li>\n<li><b>Develop complex passwords<\/b>, unique to every your account. By the way, you can <a href=\"https:\/\/www.kaspersky.com\/blog\/password-check\/\" target=\"_blank\" rel=\"noopener nofollow\">test your password reliability<\/a> using our online service.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Any of your passwords, be it for email, social networks or online banking hold value for cybercriminals, because almost any stolen account can be used in fraud schemes. It\u2019s no<\/p>\n","protected":false},"author":32,"featured_media":2617,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[305,187],"class_list":{"0":"post-2616","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-account-security","9":"tag-passwords"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/two-million-passwords-have-been-stolen-what-about-yours\/2616\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/two-million-passwords-have-been-stolen-what-about-yours\/2723\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/two-million-passwords-have-been-stolen-what-about-yours\/2926\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/two-million-passwords-have-been-stolen-what-about-yours\/2747\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/two-million-passwords-have-been-stolen-what-about-yours\/3297\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/two-million-passwords-have-been-stolen-what-about-yours\/2166\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/two-million-passwords-have-been-stolen-what-about-yours\/3297\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/two-million-passwords-have-been-stolen-what-about-yours\/3297\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/account-security\/","name":"account security"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2616"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2616\/revisions"}],"predecessor-version":[{"id":15677,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2616\/revisions\/15677"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/2617"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}