5 Million Gmail Account Credentials Leaked Online - How to, Technology and PC Security Forum | SensorsTechForum.com
CYBER NEWS

5 Million Gmail Account Credentials Leaked Online

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

Earlier this morning, unknown cyber criminals have leaked over 5 million Gmail usernames and passwords on the Internet. The database containing the credentials appeared on a Russian Bitcoin forum. All the passwords are presented in a .txt file. How the information has been collected is not clear so far, but the most reasonable explanations involve data phishing and exfiltration, as well as malware campaigns for data theft.
passwords-leak

Almost 5 Million Gmail Usernames and Passwords Dumped on the Web

The user who has provided the account details online is using the alias “tvskit” and claims that over 60% of the entries are valid. The database, containing a total of 4, 929, 090 usernames and passwords is available on ileaked.com, where users can check if their account has been compromised. PC users, who are among the victims of this data-leak, should change their password immediately.

The collection of information also includes entries from Mail.ru and Yandex. A Russian publication on CNews reveals that there have been two other data leaks this week that have made 4.6 million Mail.ru and 1.26 Yandex accounts public.

What Measures Should the Users Take to Protect Their Accounts?

  • Users are advised not to type any username or password on any website in order to prove if they are secure.
  • To prevent future attacks and heighten security, users should enable a two-factor authentication of their accounts.
  • Switching to alternative secure email providers is recommended.
Avatar

Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...