205
submitted 2 years ago by [email protected] to c/[email protected]

The Naz.API dataset is a massive collection of 1 billion credentials compiled using credential stuffing lists and data stolen by information-stealing malware.

Credential stuffing lists are collections of login name and password pairs stolen from previous data breaches that are used to breach accounts on other sites.

Information-stealing malware attempts to steal a wide variety of data from an infected computer, including credentials saved in browsers, VPN clients, and FTP clients. This type of malware also attempts to steal SSH keys, credit cards, cookies, browsing history, and cryptocurrency wallets.

all 36 comments
sorted by: hot top new old
[-] [email protected] 79 points 2 years ago

A stern reminder that we should all use a password management tool and use unique, unrelated passwords with every service.

[-] [email protected] 48 points 2 years ago

And unique email-aliases for bonus points

[-] [email protected] 13 points 2 years ago

Remind me how to do this, please. I always forget this part...

[-] [email protected] 17 points 2 years ago

SimpleLogin and Addy.io are a good start

[-] [email protected] 5 points 2 years ago

You can integrate this with Bitwarden to auto generate email aliases too

[-] [email protected] 6 points 2 years ago

Duck.com is what I use, I generate a unique email for every website. I even started changing my old logins recently for old accounts

[-] [email protected] 2 points 2 years ago

I agree with doing this, but the main drawback is that you can't easily check all of your unique aliases in HaveIBeenPwned without scripting something and paying for API access.

I have hundreds of unique aliases for my accounts, but no simple way to see when/if the services that use them are breached.

[-] [email protected] 2 points 2 years ago

Mozilla Relay is also a good option

[-] [email protected] 1 points 2 years ago

The free version of Proton Pass is a decent option.

[-] [email protected] 0 points 2 years ago
[-] [email protected] 3 points 2 years ago

That is not a standard mail feature, it won't work with all mail servers and not all that do have it use + as the separator.

[-] [email protected] 0 points 2 years ago

While it's not formalised in the email specs, support for it is pretty consistent, and only needs to work for whichever provider you use

[-] [email protected] 10 points 2 years ago

I always get funny looks when in person and I give my email address as [email protected]

I used to explain the how's and the why's but now I just say I'm a geek and move along. But if I start getting spam or bullshit to that address best believe I know who fucked up.

[-] [email protected] 15 points 2 years ago

Yeah, I got an alert in my email last night about this. Now I have to go through a massive password reset. Fun!

[-] [email protected] 14 points 2 years ago

Take the opportunity to switch to a password manager, which will allow for unique passwords.

[-] [email protected] 8 points 2 years ago

One more thing to say to me to speed up changing my services related to gmail and delete it forever.

[-] [email protected] 5 points 2 years ago* (last edited 2 years ago)

So how do we access the list to see what got out?

Edit: https://search.0t.rocks/ has the db

[-] [email protected] 10 points 2 years ago
[-] [email protected] 3 points 2 years ago

Why on earth should people trust that site?

[-] [email protected] 2 points 2 years ago* (last edited 2 years ago)

What's more insane is that some of those passwords in the lists are I still live intrusions that companies haven't acted on, like for example my Dropbox password is there and that's a new password that I just gave them a few months ago before I deleted my account

[-] [email protected] 3 points 2 years ago

Can someone help me? I was norified by havibeenpwned that some password was exposed in this leak, yet when I search https://search.0t.rocks/ for my email it comes up empty.

[-] [email protected] 3 points 2 years ago

I've checked the list on mine, those are some really really old passwords.. Must've been a long time ago.

[-] [email protected] 2 points 2 years ago

How were you able to search the list? I can't find it anywhere

[-] [email protected] 4 points 2 years ago

Just tell me your username and password and I'll tell you if you've been hacked

[-] [email protected] 1 points 2 years ago* (last edited 2 years ago)
[-] [email protected] 2 points 2 years ago

Cheers mate.

Looks like my decision to start using keepass was a good idea, these are all very old passwords

this post was submitted on 18 Jan 2024
205 points (98.6% liked)

Privacy

40805 readers
1608 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS