close
close

1.7 billion passwords are leaked in the dark web and why their is at risk

Enter Fox News for access to this content

You have reached your maximum number of articles. Register or create an account for free to read on.

If you enter and continue your e -mail, agree to receive FOX News' usage and data protection regulations that include our communication on financial incentives.

Please enter a valid email address.

Have difficulties? Click here.

Cybercriminals no longer only pursue big goals.

They follow everyone and do it with info -malware. These small, sneaky programs steal quiet passwords, browser data and registration parks from everyday devices.

A new report shows how out of control has become the problem, with infototal activity rising by 500% in just one year and harvesting more than 1.7 billion new references.

Enter the free “Cyberguy report”: Get my expert -tech tips, critical security warnings and exclusive offers as well as immediate access to mine Free “Ultimate Scam Survival Guide” If you register!

A hacker at work (Kurt “Cyberguy” Knutson)

The industrialization of theft for login information

In 2024, Fortinet's cyber security researchers observed an astonishing increase in the stolen registration data that were traded on the dark web. Over 1.7 billion login information was not harvested from old violations, but by active infections on the devices of the users.

At the center of this epidemic is a class of malware called InfoSealers, which are programs that were specially designed for the extraction of confidential information such as user names, passwords, browser -cookies, e -mail applications, crypto money exchanges and session tokens. In contrast to large -scale data injuries that aim at centralized databases, info -leders work on individual machines. They do not break into the servers of a company. They compromise the end user, often without the victim that has ever been noticed.

These protocols are then aggregated and sold by initial access brokers, intermediaries that sell compromised login information and access foxes to other cyber crime groups, including ransomware operators. The market has matured to the point where access to a company VPN, an admin dashboard or even a personal bank account with verified functions and regional prices can be bought.

Fortinets 2025 Global Threat Landscape Report Last year, identified an increase in the registration information from info -in -case infections by 500%. Redline, Vidar and Raccoon include the most widespread and most dangerous information valleys that were identified in the report.

Hacker at Laptop

A hacker at work (Kurt “Cyberguy” Knutson)

200 million social media records are leaked in large X data injuries

How info -leders work

Infostalers are usually distributed via Phishing -E emails, malicious browser extensions, fake software installers or cracked applications. As soon as you are installed on one device, scan browser databases, autofill data sets, saved passwords and local files for all data with registration information. Many are also looking for digital items, FTP registration information and cloud service applications.

It is crucial that many infostal also initiate session token and authentication cookies, which means that even users who rely on multifactor authentication are not quite safe. With a stolen session token, an attacker can completely avoid multifactor authentication and take control of the session without ever registering manually.

After the collection, the data is uploaded to an command and a tax server. From there it is either used directly by attackers or bundled in protocols and sold in forums. These protocols can contain everything from the victim's IP address and the geolocalization to your browser fingerprint and the full registration list list, which gives attackers everything you need to carry out further exploitation or imitation.

What is artificial intelligence (AI)?

Man who taps laptop

A man who works on his personal and working laptops (Kurt “Cyberguy” Knutson)

The personnel company confirms 4M records that were exposed in Major Hack

5 ways to protect yourself from info -lane malware

Since info -in -chief malware becomes a growing threat, the protection of your data requires a mixture of intelligent security habits and reliable tools. Here are five effective ways to keep your information safe.

1. Use a password manager: Many info -inferred target words in web browsers. Instead of relying on your browser, use a special password manager. Our No. 1 selection has integrated a Data violation scanner In this way you can check whether your information has been revealed in known violations. Get more details about mine Best expert-tested password managers from 2025 here.

2. Activate the two-factor authentication (2FA): Even if your login information is stolen, 2fa Add an additional security level by required a second form of check, e.g. B. a code from an authentication app or a biometric confirmation. Cybercriminals rely on stolen user names and passwords to take accounts into account. With 2FA, however, you cannot get access without the additional safety step. Activate 2FA on important accounts such as email, banking and work-related registrations.

3. Use a strong antivirus software and be careful with downloads and links: Infostal malware often spreads through malicious downloads, phishing -e emails and fake websites. Avoid downloading software or files from non -trusted sources and always check the links before clicking on you. Interfeit attackers disguise malware as legitimate software, games cheats or cracked applications. Therefore, it is best to stick to official websites and app stores for downloads.

The best way to protect yourself from malicious links, install malware and possibly access your private information is to have installed a strong antivirus software on all devices. This protection can also draw your attention to Phishing -E emails and ransomware frauds in order to keep your personal data and digital assets secure. Get my selection of the best winners of the antivirus protection for 2025 for your Windows, Mac, Android and iOS devices.

Get Fox Business on the go by clicking here

4. Hold the software updated: Cyber ​​criminal use outdated software to deliver malware. Keep your operating system, browser and security software up to date Make sure that known weaknesses are patched. Activate automatic updates, whenever possible, and install serious antivirus or endpoint protection software with which Infostaler threats can record and block before you endanger your system.

5. Consider a personal data removal service: These services can help remove your personal data from data broker websites and reduce your risk of identity theft, spam and targeted fraud. While no service can guarantee complete removal of your data from the Internet, a data removal service is really an intelligent choice. They are not cheap and not their privacy either.

These services do the entire work for you by actively monitoring your personal data and systematically deleting hundreds of websites. It is what is calmed down and has proven to be the most effective way to delete your personal data from the Internet. By limiting the available information, you reduce the risk of fraudsters to refer the data from violations of violations with information on the dark web, which makes it more difficult for you to target it. Take a look at my top selection for data removal services.

How to fight your way against debit cards hackers who descend after their money

Kurts important snack bar

The 1.7 billion passwords that were leaked in 2024 are not a relic of previous violations. You are an indication of a developing, industrialized cyber criminal economy on your back unsuspecting users and quiet infected devices. The tools are cheap, the scale is solid and the effects are personal. If you ever saved a password in a browser, downloaded an unofficial app or clicked on a link in a sketchy e -mail, your login information may already be in circulation.

Click here to get the FOX News app

In your opinion, who should primarily be responsible for the protection of personal and organizational data from cyber threats: individual users, companies, software providers or government agencies? Why? Let us know by writing us Cyberguy.com/contact.

Subscribe to my free Cyberguy report newsletter by going more of my tech tips and security warnings Cyberguy.com/newsletter.

Ask Kurt a question or let us know which stories you want to treat from us.

Follow Kurt on his social channels:

Answers to the most placed cyberguy questions:

New from Kurt:

Copyright 2025 Cyberguy.com. All rights reserved.

Leave a Comment