Bee Pwned website, known as a safe resource to check whether personal data leakage on the Internet, included on 26 Wednesdays 23 billion records stolen by Stealers. The material is known as “Alien Txtbase”.
According to HIBP, the package has about 1.5 TB with 493 million sites with paired identity information. This means that more than 284 million unique addresses and 244 million passwords are affected.
Troy Hunt, the creator of the site, added that the 199 million accounts already existing in the service due to other leaks have updated information.
Brazilian accounts were affected by leakage according to the tests. TecmundoHowever, it is not possible to evaluate the number of affected citizens.
Known about leakage
He understands that leaked identity information is stolen by daily stems and published in Telegram message application.
Log Stealers is a kind of “virus” developed to steal E -mails, passwords and other information.. Computers can infecify smart phones or bury them on fake websites to move maliciously.
“Telegram makes it very easy to publish large amounts of data under anonymity curtain (like what we’re talking about) and mass distributes massually. This is just one of many channels related to cyber crime, but it draws attention to a large amount of free access data, Troy Troy Hunt says.
As the researcher points out in HIBP, one of the main vectors of the playback logs is pirate programs. Since the files are distributed in non -grace sources, new victims are easily made.
During the calculation of leakage, Hunt still interprets how the data is qualitative. He asked HIBP subscribers to the services offered by HIBP to perform this control and used one of these people as an example. It was possible to find out that a subscriber was leaked and his information was mentioned as follows: a German man uses a Mercedes car, appreciates shopping in the fields of alcohol, there is a user of the Firefox browser, with another e -commerce that specializes in seagate and electrical appliances.
It is possible for cyber criminals to develop highly effective methods for attacking the issue.
The pressure you see below reveals how to present the information you have leaked:

How do you check that you are leaked
- Access Me ME PWED
- Add your e -mail to the center area and “Pwned?”
- Follow the messages below the result
- Was it leaked? Pay attention to the password exchange of the specified service and add the second reality of authentication to your accounts (through the third application such as Microsoft Authenticator, Google Authenticator or Authy)
Source: Tec Mundo

I am a passionate and hardworking journalist with an eye for detail. I specialize in the field of news reporting, and have been writing for Gadget Onus, a renowned online news site, since 2019. As the author of their Hot News section, I’m proud to be at the forefront of today’s headlines and current affairs.