In a shocking revelation, cybersecurity researchers have uncovered a colossal data breach, dubbed the ‘Mother of All Breaches’ (MOAB), exposing over 26 billion records from major platforms, including LinkedIn, X (formerly Twitter), Snapchat, Weibo, and Tencent. With a staggering 12 terabytes of data exposed, the breach, which Security Discovery and Cybernews discovered, is the biggest data leak to date.
While a significant portion of the stolen dataset originates from previous breaches, researchers caution that it likely includes previously undisclosed material. The leaked data extends beyond mere login credentials, comprising sensitive information that poses a considerable threat in the hands of malicious actors.
The MOAB comprises 3,800 files, each representing a distinct data breach, totaling 26 billion records. Tencent QQ, a Chinese instant messaging app, leads with 1.4 billion records, while other platforms affected include Weibo (504 million), MySpace (360 million), Twitter (281 million), LinkedIn (251 million), and many more.
The potential consequences are severe, as threat actors could exploit the aggregated data for identity theft, sophisticated phishing schemes, targeted cyberattacks, and unauthorized access to personal and sensitive accounts. The breach also implicates various government organizations in the US, Brazil, Germany, the Philippines, Turkey, and other countries.
LinkedIn responded to the allegations, stating, “We are working to fully investigate these claims, and we have seen no evidence that LinkedIn’s systems were breached.” However, the researchers emphasize the dangers users face if they reuse passwords across different accounts, as attackers can leverage this information to pivot towards more sensitive accounts.
The implications for affected users extend beyond the immediate breach, potentially making them vulnerable to spear-phishing attacks and an influx of spam emails. As the cybersecurity community grapples with the enormity of the MOAB, it underscores the critical need for enhanced security measures and user vigilance to protect against evolving cyber threats.
To delve deeper into this topic, please read the full article on in.investing