The Naz.API dataset is a massive collection of 1 billion credentials compiled using credential stuffing lists and data stolen by information-stealing malware.
Credential stuffing lists are collections of login name and password pairs stolen from previous data breaches that are used to breach accounts on other sites.
Information-stealing malware attempts to steal a wide variety of data from an infected computer, including credentials saved in browsers, VPN clients, and FTP clients. This type of malware also attempts to steal SSH keys, credit cards, cookies, browsing history, and cryptocurrency wallets.
A stern reminder that we should all use a password management tool and use unique, unrelated passwords with every service.
And unique email-aliases for bonus points
I always get funny looks when in person and I give my email address as YourCompanyName@MyDomain.com
I used to explain the how’s and the why’s but now I just say I’m a geek and move along. But if I start getting spam or bullshit to that address best believe I know who fucked up.
Remind me how to do this, please. I always forget this part…
SimpleLogin and Addy.io are a good start
Yeah, I got an alert in my email last night about this. Now I have to go through a massive password reset. Fun!
One more thing to say to me to speed up changing my services related to gmail and delete it forever.
So how do we access the list to see what got out?
What’s more insane is that some of those passwords in the lists are I still live intrusions that companies haven’t acted on, like for example my Dropbox password is there and that’s a new password that I just gave them a few months ago before I deleted my account
Can someone help me? I was norified by havibeenpwned that some password was exposed in this leak, yet when I search https://search.0t.rocks/ for my email it comes up empty.