COMB breach: 3.2B email and password pairs leaked online

Pierluigi Paganini February 07, 2021

The Largest compilation of emails and passwords (COMB), more than 3.2 billion login credentials, has been leaked on a popular hacking forum.

More than 3.2 billion unique pairs of cleartext emails and passwords have been leaked on a popular hacking forum, the collection aggregates data from past leaks, such as Netflix, LinkedIn, Exploit.in, Bitcoin, and more.

This breach was dubbed “Compilation of Many Breaches” (COMB), the data is archived in an encrypted, password-protected container.

COMB DB
Source: CyberNews

The database includes a script named count_total.sh, which was also included in 2017’s Breach Compilation. COMB also includes the query.sh script for querying emails and the sorter.sh script for sorting the data.

Experts at CyberNews added the new COMB emails to their Personal Data Leak Checker.

This does not appear to be a new breach, but rather the largest compilation of multiple breaches. Much like 2017’s Breach Compilation, COMB’s data is organized by alphabetical order in a tree-like structure, and it contains the same scripts for querying emails and passwords.

At the time of this writing, it is not clear what previously leaked databases are included in the COMB breach.

“This current leaked database appears to build on 2017’s Breach Compilation. In that leak, intelligence analysts at 4iQ discovered a single file database with 1.4 billion email and password pairs, all in plaintext.” reads the post published by CyberNews. 

“At the time, this was considered the largest credential breach exposure, almost two times larger than the previous largest credential exposure from Exploit.in which had nearly 800 million records.”

The analysis of data included in the COMB breach revealed that “14% of exposed username/passwords pairs had not previously been decrypted by the community and are now available in clear text.”

Experts from the intelligence security firm 4iQ who discovered the Breach Compilation, verified the tested credential worked.

“The intelligence analysts state that they found the 41GB dump on December 5, 2017, with the latest data updated on November 29, 2017.” continues the post.

They also remarked that the leak was not just a list, but rather an “interactive database” that allowed for “fast (one second response) searches and new breach imports. Given the fact that people reuse passwords across their email, social media, e-commerce, banking and work accounts, hackers can automate account hijacking or account takeover.”

Experts warn of the impact to consumers and businesses of this new breach that may be unprecedented due to the bad habit of reusing login credentials.

If you want to receive the weekly Security Affairs Newsletter for free subscribe here.

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, COMB)

[adrotate banner=”5″]

[adrotate banner=”13″]



you might also like

leave a comment