News

Infostealer Malware Exposes 493 Million Accounts: What You Need to Know

A recent data collection circulating on Telegram has revealed that an infostealer malware campaign has compromised 493 million unique account pairs, involving 284 million email addresses and 244 distinct passwords, according to cybersecurity expert Troy Hunt. Unlike typical data breaches that impact only one website, infostealers can target multiple accounts from a single individual, creating a larger security headache.

The malware in question not only collects data from breaches and leaks but actively harvests account credentials, potentially affecting both primary and throwaway accounts. Users who reuse passwords or employ weak authentication methods are especially at risk.

To help affected individuals check if their credentials have been compromised, Hunt has updated the popular “Have I Been Pwned” website with details from the latest stealer logs. Users can verify their email addresses and receive notifications of any future breaches by following these steps:

  1. Access the Service: On a PC, click “Notify Me” at the top of the page, or tap the hamburger icon on mobile to find the option.
  2. Enter Your Email: Complete the form and captcha to register.
  3. Verify Your Email: A verification email will be sent—click the link to view personalized breach results.
  4. Review Stealer Logs: Scroll to the “Stealer Logs” section at the bottom to see if your data appears in the dump.

Additionally, if you’re worried about password security, you can use the “Pwned Passwords” tool on the site to check individual passwords. For bulk password checking, 1Password has partnered with Have I Been Pwned to offer enhanced security measures.

Experts advise that if you find your information in these logs, it may be an indication that your PC could be infected with malware. To protect your computer:

  • Uninstall Suspicious Software: Remove any untrusted or pirated applications.
  • Update Antivirus Software: Ensure your antivirus is current and set to run regular scans.
  • Perform a Deep Scan: Manually run a full system scan to detect any hidden threats.

As cybercriminals leverage advanced malware to steal data, taking proactive steps to secure your accounts and devices is more important than ever.

Photo Credit: DepositPhotos.com

Leave a Reply

Your email address will not be published. Required fields are marked *