Categories: SecurityWorkspace

Millions Of MySpace Account Details ‘Leaked Online’

Usernames and passwords for more than 360 million MySpace accounts have been stolen from the social network and are being sold online, according to a breach database provider.

LeakedSource, which allows users to pay for subscriptions to its database of breached personal data, said the MySpace data was provided to it by one of its users.

360 million accounts compromised

The data set contains 360,213,024 records, with more than 111 million of the records containing a username and more than 68 million containing a secondary password, LeakedSource said.

According to the site, the passwords were stored using SHA1 algorithm, which is considered relatively easy to decrypt, and didn’t use “salting”, a technique that involves the addition of random data to make decryption more difficult.

“The methods MySpace used for storing passwords are not what internet standards propose,” LeakedSource said.

Only a few thousand of the passwords were over 10 characters in length, while almost none contained an upper-case character, according to the site. Some contained a “1” at the end, suggesting MySpace required passwords to contain a number, according to LeakedSource.

Popular passwords included “password1”, “abc123” and “123456”, the site found.

LinkedIn breach

Last week LeakedSource said it had obtained a copy of 117 million password records stolen from social network LinkedIn in 2012 and which were being offered for sale online.

LinkedIn said at the time that the breach had only affected about 6.5 million user accounts, and required a password reset for those accounts only, meaning that another 110.5 million accounts may still be vulnerable.

The business networking site said it was forcing a password reset for the affected accounts.

Following the latest LinkedIn incident, Microsoft last week forced all users to upgrade their passwords, and banned the use of common credentials (such as “password”) across all its sites.

Such credentials have been banned on Hotmail since 2011.

MySpace did not immediately respond to a request for comment.

Are you a security pro? Try our quiz!

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

View Comments

  • Another day, another security breach. However this time, it’s being named the biggest breach to date, with more than 360 million usernames and passwords stolen. It begs the question: is any organisation safe from being the next target? Probably not.

    Monitoring the dark web for compromised accounts allows a company to be alerted that it has been hacked before the breach becomes public knowledge. This gives the company time to prepare a public statement and have the users change their credentials, mitigating further damage from occurring. What’s more, normal cyber defences are not enough; it’s about being proactive, rather than simply reactive. Testing the security of the whole business – from the perimeter all the way through to employee awareness training – coupled with the advanced warning provided by constant monitoring, saves crucial time, protects reputation and gives the CISO a better nights sleep.

Recent Posts

Tesla Backs Away From Gigacasting Manufacturing – Report

Tesla retreats from pioneering gigacasting manufacturing process, amid cost cutting and challenges at EV giant

12 hours ago

US Urges No AI Control Of Nuclear Weapons

No skynet please. After the US, UK and France pledge human only control of nuclear…

13 hours ago

LastPass Separates From Parent After Security Incidents

New chapter for LastPass as it becomes an independent company to focus on cybersecurity, after…

15 hours ago

US To Ban Huawei, ZTE From Certifying Wireless Kit

US FCC seeks to ban Chinese telecom firms at centre of national security concerns from…

19 hours ago

Anthropic Launches Enterprise-Focused Claude, Plus iPhone App

Two updates to Anthropic's AI chatbot Claude sees arrival of a new business-focused plan, as…

21 hours ago