Have I Been Pwned adds 71 million emails from Naz.API stolen account list

The Naz.API dataset is a massive collection of 1 billion credentials compiled using credential stuffing lists and data stolen by information-stealing malware.

Credential stuffing lists are collections of login name and password pairs stolen from previous data breaches that are used to breach accounts on other sites.

Information-stealing malware attempts to steal a wide variety of data from an infected computer, including credentials saved in browsers, VPN clients, and FTP clients. This type of malware also attempts to steal SSH keys, credit cards, cookies, browsing history, and cryptocurrency wallets.

Knuschberkeks,

Can someone help me? I was norified by havibeenpwned that some password was exposed in this leak, yet when I search search.0t.rocks for my email it comes up empty.

KarnaSubarna,
@KarnaSubarna@lemmy.ml avatar

What about haveibeenpwned.com ?

chaosppe,
@chaosppe@lemmy.world avatar

I’ve checked the list on mine, those are some really really old passwords… Must’ve been a long time ago.

bfg9k,

How were you able to search the list? I can’t find it anywhere

chaosppe,
@chaosppe@lemmy.world avatar
bfg9k,

Cheers mate.

Looks like my decision to start using keepass was a good idea, these are all very old passwords

Bizarroland,
Bizarroland avatar

Just tell me your username and password and I'll tell you if you've been hacked

dez,
@dez@lemmy.ml avatar

One more thing to say to me to speed up changing my services related to gmail and delete it forever.

swampdownloader, (edited )

So how do we access the list to see what got out?

Edit: search.0t.rocks has the db

Pika,

What’s more insane is that some of those passwords in the lists are I still live intrusions that companies haven’t acted on, like for example my Dropbox password is there and that’s a new password that I just gave them a few months ago before I deleted my account

deweydecibel,

Why on earth should people trust that site?

camr_on,
@camr_on@lemmy.world avatar

haveibeenpwned.com

swampdownloader,

No i mean the dump to see which passwords are out

kn33,
space,

You can find a password checking utility on haveibeenpwned.com (the tool doesn’t send your password to the server, but only the first 5 characters of the hashed password, which is very safe). There are CLI tools on GitHub you can use to bulk test passwords. They also provide a downloadable list of hashes.

Alternatively, check if your password manager has a built-in tool for checking for passwords in known databases.

deweydecibel,

Alternatively, just start changing passwords, regardless if they’re in the breach or not. Prioritize the ones with financial information, then the ones with personal info, the ones you visit frequently versus some shitty site you visited once that made you make an account back in 2011, etc.

I know that’s a lot of accounts for some people but you don’t have to do them all at once. Go reset a password or two on a site today at lunch. Then do another one tomorrow. And a few the next day.

I actually remember reading about an app or feature on a password manager that would do something like this. Rather than bark at you to reset 100 different accounts at once, it would just give you 1 or 2 random accounts a day to go reset the password on.

henfredemars,

A stern reminder that we should all use a password management tool and use unique, unrelated passwords with every service.

SexyPolariton,

And unique email-aliases for bonus points

Narwhalrus,

Remind me how to do this, please. I always forget this part…

RedWizard,
@RedWizard@lemmygrad.ml avatar

Mozilla Relay is also a good option

Kbin_space_program,

Your.email@address.com
Your.email+now.with.alias@address.com

taladar,

That is not a standard mail feature, it won’t work with all mail servers and not all that do have it use + as the separator.

xor,

While it’s not formalised in the email specs, support for it is pretty consistent, and only needs to work for whichever provider you use

adamkempenich,
@adamkempenich@lemmy.world avatar

For Gmail users, you can add a plus sign to the end of your email username, and then any set of characters you’d like.

So if your address was FakeAddressDoNotUse@gmail.com, and wanted an easy-to-remember login for Hot Dog Hut, you could append it in the following way:

FakeAddressDoNotUse+HotDogHut@gmail.com

EmbeddedEntropy,

I used to use that approach, but found in the last several years more than half the web sites I use reject email addresses with “+” characters.

I even use several sites that used to take those addresses just fine now reject them. That made me wonder if some common JS package for parsing email addresses got changed.

seathru,

That used to be my go-to method but I found it works less and less. Places know the gmail tricks and auto-strip them out of the address.

Started using Proton’s Hide-my-email and never going back. It’s time to move away from google anyways.

Tangent5280,

Many privacy centric mail companies now offer email aliases and temporary mail ids in built.

BolexForSoup,
BolexForSoup avatar

Step 1: drop gmail

Step 2: get proton mail and activate simple login or use one of the alias slots they give you (or both!). Enjoy.

Optional step 3: Use Firefox relay on top if you really want to go wild but I find this gets folks turned around when layered on top as well. Great for burner/1-time use emails though.b

trevor,

I agree with doing this, but the main drawback is that you can’t easily check all of your unique aliases in HaveIBeenPwned without scripting something and paying for API access.

I have hundreds of unique aliases for my accounts, but no simple way to see when/if the services that use them are breached.

Bocky,

Duck.com is what I use, I generate a unique email for every website. I even started changing my old logins recently for old accounts

ioslife,

SimpleLogin and Addy.io are a good start

ebits21,
@ebits21@lemmy.ca avatar

You can integrate this with Bitwarden to auto generate email aliases too

seathru,

The free version of Proton Pass is a decent option.

Sir_Kevin,
@Sir_Kevin@lemmy.dbzer0.com avatar

I always get funny looks when in person and I give my email address as YourCompanyName@MyDomain.com

I used to explain the how’s and the why’s but now I just say I’m a geek and move along. But if I start getting spam or bullshit to that address best believe I know who fucked up.

gregorum,

Yeah, I got an alert in my email last night about this. Now I have to go through a massive password reset. Fun!

PM_Your_Nudes_Please,

Take the opportunity to switch to a password manager, which will allow for unique passwords.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • privacy@lemmy.ml
  • ngwrru68w68
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • megavids
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • provamag3
  • JUstTest
  • All magazines