• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

SwaCash | Internet Marketing News

Latest Updates on Tech, Internet & Digital World

  • Home
  • Digital Marketing
  • Social Media
  • Technology
  • About
  • Contact Us
You are here: Home / Uncategorized / FBI to make public the stolen passwords it uncovers in its investigations

FBI to make public the stolen passwords it uncovers in its investigations

May 28, 2021 by Amer Bekic

The FBI will dump the collections of compromised passwords it uncovers in its investigations into Pwned Password, the section of Have I Been Pwned dedicated to passwords. Good news for data breach victims.

Last month, the FBI for the first time shared data from the victims of one of its investigations – that of the Emotet gang – with the Have I Been Pwned (HIBP) site. Gigantic collection point for data leaks, this site has an exceptional place in the cybersecurity ecosystem: it allows millions of Internet users to know for free when their email address or their password has been leaked.

As an unofficial reward for its services, HIBP has enjoyed impunity since its creation in 2013. It is not worried about its collection of data leaks, a practice which is however difficult to comply with certain regulations such as the GDPR. While it flirts with the limits of the law, the site fills a void left by this same right in the life of personal data after their leak. In the end, the public authorities are thrilled to rely on Have I Been Pwned as a trusted partner. Starting with the FBI: sharing Emotet’s data has been a successful trial run.

Have I Been Pwned has forged a unique partnership with the FBI. 

Troy Hunt, the founder of HIBP, announced on his blog on May 28 that now, when the FBI finds a collection of passwords in its investigations, it can dump them on Pwned Password, the dedicated Have I Been Pwned tab. passwords. According to Hunt, this feature receives nearly a billion requests per month, proof of its success.

Hash Passwords For Added Security

The investigation office thus becomes the first official contributor to Have I Been Pwned, which has relied since its creation on ad hoc submissions from various sources, sometimes anonymous. Specifically, the FBI will give the site only passwords, and no other information. They will be “hashed” protected by an encryption (SHA-1 or NTLM). For example, the hash of the password “12345” in SHA-1 becomes “8cb2237d0679ca88db6464eac60da96345513964”. Of course, HIBP users will not have to know their password hash, it is the site that will apply the encryption to do its research. Troy Hunt or a hacker of the site cannot read the passwords in the clear, but the encryption will not prevent the proper functioning of the site.

17 Governments Use Pwned Password

Pwned Password passwords can be downloaded or called up through an API, and they are built into all kinds of tools. This operation means that the FBI will make public the hashes of the passwords of the victims of its investigations. Be aware that decrypting hashes is a laborious task for complex passwords, but relatively easy to do for simple passwords. Overall, they expected the initiative to help thousands of people avoid hacks. For example, 17 governments are using the service to make sure their employees are not using already leaked passwords.

Knowing that they have leaked your password is very important. When hackers discover a password, they add it to lists that they will use to connect to all kinds of accounts: social networks, SVoD, but also addresses and professional tools. If the victim reuses their password on several accounts, they will lose control of them.

Pwned Password Is Also Becoming Open Source

Troy Hunt took advantage of his blog to make another announcement, that of the opening of Pwned Password in open source, a project he has been thinking about since August 2020. Concretely, the code of his tool is available on GitHub and developers in all genres can offer their contribution.

The interest of this approach is threefold:

  • It perpetuates the project. Today, Have I Been Pwned entirely depends on Troy Hunt, and if it were to suddenly disappear, the site would disappear with him.
  • This is an important proof of transparency. In open source, anyone can check their tool, make sure that it is not vulnerable, or that Hunt is not lying about how it works.It allows to consider a real development of the tool.
  • Hunt asked them. NET Foundation to oversee the contributions and manage the community. He can suggest the development of new functionalities, as well as receive new suggestions for evolution.

Filed Under: Uncategorized

Primary Sidebar

E-mail Newsletter

More Articles

Three Tweets related to EtherRock sales

Not one not two, Three digital pet rock cliparts sell for $600K each

August 22, 2021 By Amer Bekic

PolyNetwork Hacking Incedence

Hacker who stole $800 Million, now offered a white hat job by its victim firm

August 20, 2021 By Amer Bekic

credit card back panel containing the magnetic stripe

MasterCard announces future without magnetic stripe on the back.

August 17, 2021 By Amer Bekic

Fortune magazine sells its cover art as NFT. Raises 1.3 Million dollars

August 14, 2021 By Amer Bekic

Bored Ape Yacht Club Token 3749

This bored ape pic just sold for 1.29 Million dollars!

August 14, 2021 By Amer Bekic

Footer

Search this site

Recent Articles

  • Not one not two, Three digital pet rock cliparts sell for $600K each
  • Hacker who stole $800 Million, now offered a white hat job by its victim firm
  • MasterCard announces future without magnetic stripe on the back.
  • Fortune magazine sells its cover art as NFT. Raises 1.3 Million dollars
  • This bored ape pic just sold for 1.29 Million dollars!

Browse Topics

  • Blogging (164)
  • Content Marketing (7)
  • Cryptocurrency (5)
  • Digital Marketin (4)
  • Digital Marketing (333)
  • E-commerce (122)
  • Google (195)
  • Google Ads (24)
  • Marketing (166)
  • News (344)
  • Seo (74)
  • Social Media (43)
  • Technology (27)
  • Uncategorized (82)
  • WordPress (22)

Tags

Amazon Android Apple Apple Watch Artificial Intelligence B2B Bitcoin Blogging China Content Content Marketing Coronavirus Cryptocurrency Cybercriminals cybersecurity Digital Digital Marketing Facebook Gaming Google Increase Sales Instagram Intel internet strategy iOS 15 iPhone iPhone 12 IPhone 13 Make Money Marketing Microsoft Nvidia Online Marketing Samsung Science Search engine optimization Seo SEO optimization by content Social Media Social networks Technology TikTok Twitter Windows 11 YouTube

© 2019–2025 ยท SwaCash.com