Experts at ImmuniWeb discovered that 21,040,296 login credentials for 500 Fortune companies are offered in plain text on multiple services in the dark web.
The researchers used their OSINT (Open Source Intelligence) technology to crawl places and resources within the TOR network, across various web forums, Pastebin, IRC channels, social networks, messenger chats and many other locations where it
“We found over 21 million (21,040,296) credentials belonging to Fortune 500 companies, amid which over 16 million (16,055,871) were compromised during the last 12 months.” states the report published by ImmuniWeb. “As many as 95% of the credentials contained unencrypted, or
The following table shows stolen credentials per industry:
Most of the login credentials (95%) include plaintext passwords, 76% of them were compromised during the last 12 months.
Only 4.9 million (4,957,093) credentials contained fully unique passwords, a circumstance that confirms the bad habit of many users to reuse passwords.
The analysis of the passwords revealed that many companies continue to use weak passwords, especially those belonging to the retail (47,29%), Telecommunications (37,57%), Industrials (37,36%).
Experts noticed that Technology, Financials and Energy are the top 3 industries with the largest volume of credentials exposed in breaches of adult-oriented websites and resources.
Another interesting data emerged from the report, on average, 11% of the stolen passwords from one breach are identical pointing out to usage of default passwords, proliferation of [spam & data scraping] bots creating accounts, or a previous password reset setting an identical password to a large set of accounts.
“These numbers are both frustrating and alarming.
“With some persistence, they easily break-in being unnoticed by security systems and grab what they want. Worse, many such intrusions are technically
(SecurityAffairs – Fortune 500, dark web)