HomeCyber BalkansLargest breach in history uncovered after 26 billion records leaked

Largest breach in history uncovered after 26 billion records leaked

Published on

spot_img

Yesterday, the Cybernews security team announced the discovery of what is believed to be the largest data breach in history. Working alongside security researcher Bob Dyachenko, the team uncovered an open web instance containing an unprecedented 12 terabytes of information and a staggering 26 billion records, now referred to as the Mother of All Breaches (MOAB). The records belonged to major online brands such as Twitter, LinkedIn, Adobe, Wattpad, and more. The breach also included records from global governmental organizations, with Tencent, the Chinese messaging app, having the largest number of exposed records at 1.4 billion.

Greg Day, SVP and global field CISO at Cybereason, expressed concerns about the challenges businesses face in promptly detecting intricate cyber-attacks. The exposed records pose a significant threat to consumers, as hackers now have access to a vast amount of Personally Identifiable Information (PII) that can be used maliciously for phishing, credential-stuffing, and personal identity theft.

Paul Bischoff, Consumer Privacy Advocate at Comparitech, emphasized the potential dangers of the breach, highlighting how hackers could use the stolen data to gain access to victims’ personal information. He warned that databases like the MOAB would only get more complete over time, making it increasingly difficult for victims to protect themselves against fraud and other crimes.

Erfan Shadabi, a cybersecurity expert with comforte AG, echoed these concerns, emphasizing the potential impact of the breach and the risk of a tsunami of credential-stuffing attacks. Shadabi warned that due to the widespread practice of username and password reuse, the threat could be even more far-reaching than initially anticipated.

The breach poses a significant challenge for individuals and organizations, with experts expressing the need for proactive measures to safeguard personal and sensitive data. Chris Hauk, Consumer Privacy Champion at Pixel Privacy, advised internet users to act as if their personal data is already available on the web and to stay alert for phishing attempts using relevant data from the breach.

In response to the breach, Cybernews provides a personal data check tool that allows individuals to check if their personal information is involved in the breach. Tamara Kirchleitner, Senior Intelligence Operations Analyst at Centripetal, emphasized the importance of organizations prioritizing data protection and investing in comprehensive cybersecurity strategies to prevent future breaches.

Tom Gaffney, a Cybersecurity expert at F-Secure, emphasized the need for individuals to be proactive in safeguarding their data and understanding how to reduce the risk of their data being compromised.

Despite the grim outlook following the Mother of All Breaches, taking proactive steps today to protect personal and sensitive data can help mitigate the risks for consumers and organizations. With the appropriate measures in place, there may still be a chance for everyone to emerge unscathed from this unprecedented breach.

Source link

Latest articles

GitHub Issue Alerts Exploited in OAuth Phishing Scam Targeting Developers

In a concerning trend, cybercriminals are exploiting GitHub’s notification system to orchestrate phishing attacks...

HSM KMS Vault

The financing sector stands at a pivotal juncture as the advancements in quantum computing...

The 7 Leading AI SOC Platforms to Watch in 2026

The Rise of AI-Driven SOC Platforms: Revolutionizing Security Operations In recent years, Security Operations Centers...

Canada’s Cyber Resilience Plan Addresses AI Threats

Canada's Comprehensive Cyber Resilience Plan: A Response to AI-Driven Threats Canada has recently unveiled a...

More like this

GitHub Issue Alerts Exploited in OAuth Phishing Scam Targeting Developers

In a concerning trend, cybercriminals are exploiting GitHub’s notification system to orchestrate phishing attacks...

HSM KMS Vault

The financing sector stands at a pivotal juncture as the advancements in quantum computing...

The 7 Leading AI SOC Platforms to Watch in 2026

The Rise of AI-Driven SOC Platforms: Revolutionizing Security Operations In recent years, Security Operations Centers...