Computer hacking (illustration).

-

ALLILI MOURAD / SIPA

It is possibly "the largest compilation of pirated user credentials ever released online."

The specialist site BGR announced last week that a "collection of user data" had been uploaded by a cybercriminal to a hacker forum.

Dubbed Comb for “Compilation of Many Breaches”, this file disclosed access to 3.28 billion combinations of email and account passwords hacked in recent attacks IT against web giants, indicates the specialized site Cybernews.

What really happened?

A gigantic database of more than 3 billion username-password associations appeared on Tuesday, February 2 on an Internet forum used by hackers.

The author of this database says he grouped together various data stolen during the LinkedIn and Netflix hacks… “So this is not the result of a new hack, but rather a merger of existing data that had already been stolen in part of previous leaks, ”say cybersecurity experts.

On this file called Comb, the information has been carefully classified in alphabetical order and by service used.

Among the data stolen are the credentials of 117 million LinkedIn accounts that were leaked in 2021 and access to the Netflix site.

But also information about Gmail, Hotmail and many more accounts ... If your information has been collected, hackers can access your email and password combinations and use them to hack your other accounts.

How do you know if your data has been disclosed?

The CyberNews site has set up a search engine that lists the identifiers that have been leaked.

You just need to type in your email address to find out if your data has been hacked.

If your e-mail is affected, it is advisable to quickly change your password.

The CNIL (National Commission for Informatics and Liberties) recommends choosing passwords comprising at least 12 characters made up of upper case letters, lower case letters, numbers and special characters.

It is also recommended to set up two-factor access on email accounts to ensure their security.

“The second authentication limits the use of extorted access codes.

In general, it is based on a combination of your fingerprints, face, voice, etc., what you know (password, PIN code, etc.) and / or what you have (chip card, token, smartphone, etc.) .

You may have already set it up on your smartphone with authentication based on a PIN code and biometric recognition, ”explains Blandine Delaporte, cyber evangelist at Check Point Software Technologies.

High Tech

Why the coronavirus has amplified cyber attacks against cities and communities

High Tech

Dating site: hacker leaks data from 2.28 million users

  • Netflix

  • By the Web

  • Gmail

  • Messaging

  • Linkedin

  • Cybersecurity

  • E-mail

  • Password

  • Hacker

  • Pirate

  • Piracy