- cross-posted to:
- becomeme@sh.itjust.works
- cross-posted to:
- becomeme@sh.itjust.works
The Naz.API dataset is a massive collection of 1 billion credentials compiled using credential stuffing lists and data stolen by information-stealing malware.
Credential stuffing lists are collections of login name and password pairs stolen from previous data breaches that are used to breach accounts on other sites.
Information-stealing malware attempts to steal a wide variety of data from an infected computer, including credentials saved in browsers, VPN clients, and FTP clients. This type of malware also attempts to steal SSH keys, credit cards, cookies, browsing history, and cryptocurrency wallets.
Take the opportunity to switch to a password manager, which will allow for unique passwords.
But the issue is that you don’t know which of your passwords is compromised
Sure you do. Search by username or email address, and it’ll give you a list of compromised sites.
For Naz.API specifically (at least last I checked) it just returned Naz.API, not what accounts specifically were compromised