205
submitted 1 year ago by [email protected] to c/[email protected]

The Naz.API dataset is a massive collection of 1 billion credentials compiled using credential stuffing lists and data stolen by information-stealing malware.

Credential stuffing lists are collections of login name and password pairs stolen from previous data breaches that are used to breach accounts on other sites.

Information-stealing malware attempts to steal a wide variety of data from an infected computer, including credentials saved in browsers, VPN clients, and FTP clients. This type of malware also attempts to steal SSH keys, credit cards, cookies, browsing history, and cryptocurrency wallets.

all 36 comments
sorted by: hot top new old
[-] [email protected] 79 points 1 year ago

A stern reminder that we should all use a password management tool and use unique, unrelated passwords with every service.

[-] [email protected] 48 points 1 year ago

And unique email-aliases for bonus points

[-] [email protected] 13 points 1 year ago

Remind me how to do this, please. I always forget this part...

[-] [email protected] 17 points 1 year ago

SimpleLogin and Addy.io are a good start

[-] [email protected] 5 points 1 year ago

You can integrate this with Bitwarden to auto generate email aliases too

[-] [email protected] 6 points 1 year ago

Duck.com is what I use, I generate a unique email for every website. I even started changing my old logins recently for old accounts

[-] [email protected] 2 points 1 year ago

I agree with doing this, but the main drawback is that you can't easily check all of your unique aliases in HaveIBeenPwned without scripting something and paying for API access.

I have hundreds of unique aliases for my accounts, but no simple way to see when/if the services that use them are breached.

[-] [email protected] 2 points 1 year ago

Mozilla Relay is also a good option

[-] [email protected] 1 points 1 year ago

The free version of Proton Pass is a decent option.

[-] [email protected] 0 points 1 year ago
[-] [email protected] 3 points 1 year ago

That is not a standard mail feature, it won't work with all mail servers and not all that do have it use + as the separator.

[-] [email protected] 0 points 1 year ago

While it's not formalised in the email specs, support for it is pretty consistent, and only needs to work for whichever provider you use

[-] [email protected] 10 points 1 year ago

I always get funny looks when in person and I give my email address as [email protected]

I used to explain the how's and the why's but now I just say I'm a geek and move along. But if I start getting spam or bullshit to that address best believe I know who fucked up.

[-] [email protected] 15 points 1 year ago

Yeah, I got an alert in my email last night about this. Now I have to go through a massive password reset. Fun!

[-] [email protected] 14 points 1 year ago

Take the opportunity to switch to a password manager, which will allow for unique passwords.

[-] [email protected] 8 points 1 year ago

One more thing to say to me to speed up changing my services related to gmail and delete it forever.

[-] [email protected] 5 points 1 year ago* (last edited 1 year ago)

So how do we access the list to see what got out?

Edit: https://search.0t.rocks/ has the db

[-] [email protected] 10 points 1 year ago
[-] [email protected] 3 points 1 year ago

Why on earth should people trust that site?

[-] [email protected] 2 points 1 year ago* (last edited 1 year ago)

What's more insane is that some of those passwords in the lists are I still live intrusions that companies haven't acted on, like for example my Dropbox password is there and that's a new password that I just gave them a few months ago before I deleted my account

[-] [email protected] 3 points 1 year ago

Can someone help me? I was norified by havibeenpwned that some password was exposed in this leak, yet when I search https://search.0t.rocks/ for my email it comes up empty.

[-] [email protected] 3 points 1 year ago

I've checked the list on mine, those are some really really old passwords.. Must've been a long time ago.

[-] [email protected] 2 points 1 year ago

How were you able to search the list? I can't find it anywhere

[-] [email protected] 4 points 1 year ago

Just tell me your username and password and I'll tell you if you've been hacked

[-] [email protected] 1 points 1 year ago* (last edited 1 year ago)
[-] [email protected] 2 points 1 year ago

Cheers mate.

Looks like my decision to start using keepass was a good idea, these are all very old passwords

this post was submitted on 18 Jan 2024
205 points (98.6% liked)

Privacy

39340 readers
822 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS