This is one of the biggest credentials database that ever discovered in history and previous largest credential exposure, the Exploit.in combo list that exposed 797 million records.
A depth research has been conducted in this database and researchers confirms that non of the passwords are encrypted and most of them have been verified to be true.
This database consists of more scary information and its working ultimately fast response (one-second response) searches and new breach imports.
According to 4iQ Reseracher, The data is organized alphabetically, offering examples of trends in how people set passwords, reuse them and create repetitive patterns over time.
This single file database is very fastly responding to search the passwords than ever before. for an example, searching for “admin,” “administrator” and “root” returned 226,631 passwords of admin users in a few seconds.
Database file name mentioned “imported.log” with 133 addition or new breaches apart from 252 previous breaches.
These are some of breach and number of password that have been leaked from the concern breaches.
Clear Text Credentials
This Database has recently updated ad 11/29/2017 was the last time this DB has updated and 41GB dump was found on 5th December 2017.
Exactly the total amount of Clear Text Credentials (usernames/clear text password pairs) is 1,400,553,869 and 14% of exposed username/passwords pairs had not previously been decrypted by the community and are now available in clear text.
“This new breach adds 385 million new credential pairs, 318 million unique users, and 147 million passwords pertaining to those previous dumps.”
These are the top 40 passwords list that has been used by the users from previous breaches.
Given the fact that people reuse passwords across their email, social media, e-commerce, banking and work accounts, hackers can automate account hijacking or account takeover.