Jump to content

Data Breach - 1,500 Sites, 27 Million Accounts affected

Default_Idiot

A data breach of 1,500 sites that did not implement HTTPS has surfaced. The leaked information includes emails and passwords in plain text. More than 2 GB of .txt files containing user credidentials were freely available on http://www.pxahb.xyz . The breach has probably occured in December 2017, judging by the files' date of creation. I can't provide you with the full list of affected websites, but there are no "big ones" amongst them(e.g. Google, Yahoo, Amazon, etc.) as they all implement HTTPS correctly.

 

The website has been taken down, but I found some url reports that contain screenshots:

Report 1

Report 2

 

There is no information about the breach in mainstream media, the only coverage that I could find is a YouTube video from the (fairly) popular Linux youtuber Quidsup. He is a reliable source when it comes to computer security/privacy and related topics(btw he works as a malware analyst). I will try to update the topic if any new information appears.

 

However, the leaked data still shows that people are not very creative when it comes to passwords, phrases like "123456" and "password" are common. But the ones to blame are the people who maintain those websites. Having a login page on your website in 2018 and not having HTTPS enabled is a complete suicide - sniffing HTTP traffic can be done by anyone skilful enough to power on a computer. SSL certificates are not expensive to obtain, and certificate authorities such as Let's Encrypt give them out for free. There is literally no excuse for not having HTTPS on your website.

 

Update: Thanks to Google's cache we have part of the list of affected websites: https://webcache.googleusercontent.com/search?q=cache:lITAZhUWlk4J:pxahb.xyz/emailpass/+&cd=2&hl=en&ct=clnk&gl=en

 

 

 

 

 

 

 

Edited by Default_Idiot
Link to comment
Share on other sites

Link to post
Share on other sites

Surprise surprise - it continues..

Link to comment
Share on other sites

Link to post
Share on other sites

I'm always surprised when I stumble upon a site that doesn't have an SSL certificate. CloudFlare offers free SSL certificates to literally anyone who creates an account. Hell, even this site uses a free CloudFlare certificate.

this.PNG.eccbe0bac312ca0d473e4df4b0bf7703.PNG

Make sure to quote me or use @PorkishPig to notify me that you replied!

 

 

Desktop

CPU - Ryzen 9 3900X | Cooler - Noctua NH-D15 | Motherboard - ASUS TUF X570-PLUS RAM - Corsair Vengeance LPX DDR4-3200 32GB Case - Meshify C

GPU - RTX 3080 FE PSU - Straight Power 11 850W Platinum Storage - 980 PRO 1TB, 960 EVO 500GB, S31 1TB, MX500 500GB | OS - Windows 11 Pro

 

Homelab

CPU - Core i5-11400 | Cooler - Noctua NH-U12S | Motherboard - ASRock Z590M-ITX RAM - G.Skill Ripjaws V DDR4-3600 32GB (2x16)  | Case - Node 304

PSU - EVGA B3 650W | Storage - 860 EVO 256GB, Sabrent Rocket 4.0 1TB, WD Red 4TB (x6 in RAIDZ1 w/ LSI 9207-8i) | OS - TrueNAS Scale (Debian)

Link to comment
Share on other sites

Link to post
Share on other sites

Heck, I stumbled across a website last week that actually expected me to input CC data on an insecure page.  This same site had a secure login to use both Amazon and Paypal, yet couldn't secure their own payment page.  It doesn't surprise me in the least that there are websites who haven't figured out how to secure their login.

Link to comment
Share on other sites

Link to post
Share on other sites

Nothing major as far as I can tell. Small business sites, non-US based sites, etc. Seeing if I can get a copy of the files now....

PLEASE QUOTE ME IF YOU ARE REPLYING TO ME

Desktop Build: Ryzen 7 2700X @ 4.0GHz, AsRock Fatal1ty X370 Professional Gaming, 48GB Corsair DDR4 @ 3000MHz, RX5700 XT 8GB Sapphire Nitro+, Benq XL2730 1440p 144Hz FS

Retro Build: Intel Pentium III @ 500 MHz, Dell Optiplex G1 Full AT Tower, 768MB SDRAM @ 133MHz, Integrated Graphics, Generic 1024x768 60Hz Monitor


 

Link to comment
Share on other sites

Link to post
Share on other sites

6 hours ago, Default_Idiot said:

However, the leaked data still shows that people are not very creative when it comes to passwords, phrases like "123456" and "password" are common.

This shouldn’t surprise anyone. People using such weak passwords are basically begging to be hacked. 

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

5 hours ago, Homeless Pineapple said:

Hell, even this site uses a free CloudFlare certificate.

Not only that as Cloudflare is also the one protecting the forum from denial of service attacks. 

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

meh, roughly around 98% of em are very uninteresting sites. pretty much this leak is probably the biggest exposure they've received. LOL.

Details separate people.

Link to comment
Share on other sites

Link to post
Share on other sites

LastPass needs to get on buying another round of integration. 

 

Seriously, one of the password Wallets, depending on how over-the-top you want to be in security, is the way to go. 

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, Tech_Dreamer said:

meh, roughly around 98% of em are very uninteresting sites. pretty much this leak is probably the biggest exposure they've received. LOL.

There's a few EDU sites in there.

Link to comment
Share on other sites

Link to post
Share on other sites

9 hours ago, huilun02 said:

Any notable sites that got breached?

The only one I recognized was www.akoma-trade.com, but there was a .org for a county website in New Jersey and a couple .edu sites. But nothing I've ever seen. Looked like a lot of sites with .cz.*, so unless you visit a lot of niche foreign sites, there doesn't appear to be much of anything.

 

How people get associated with these sites is beyond me.... And the password security? wow...

 

Incase anyone is curious, here is a good site to "test" potential passwords https://www.bennish.net/password-strength-checker/

This uses zxcvbn. There is also a link to the github incase anyone wants to download it and run it off network to test the strength of their own password. What is funny? "1 + 2 = 3" is much stronger than 12345 or password123, etc...

Link to comment
Share on other sites

Link to post
Share on other sites

On 2/1/2018 at 1:43 AM, Ryujin2003 said:

What is funny? "1 + 2 = 3" is much stronger than 12345 or password123, etc...

Time to update my passwords, thanks for the tip. xD

Grammar and spelling is not indicative of intelligence/knowledge.  Not having the same opinion does not always mean lack of understanding.  

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×