More than 21 million login credentials belonging to Fortune 500 companies are available for sale in various places on the dark web.
Experts at ImmuniWeb discovered that 21,040,296 login credentials for 500 Fortune companies are offered in plain text on multiple services in the dark web.
The researchers used their OSINT (Open Source Intelligence) technology to crawl places and resources within the TOR network, across various web forums, Pastebin, IRC channels, social networks, messenger chats and many other locations where it is possible find leaked data.
“We found over 21 million (21,040,296) credentials belonging to Fortune 500 companies, amid which over 16 million (16,055,871) were compromised during the last 12 months.” states the report published by ImmuniWeb. “As many as 95% of the credentials contained unencrypted, or bruteforced and cracked by the attackers, plaintext passwords.”
The following table shows stolen credentials per industry:
Most of the login credentials (95%) include plaintext passwords, 76% of them were compromised during the last 12 months.
Only 4.9 million (4,957,093) credentials contained fully unique passwords, a circumstance that confirms the bad habit of many users to reuse passwords.
The analysis of the passwords revealed that many companies continue to use weak passwords, especially those belonging to the retail (47,29%), Telecommunications (37,57%), Industrials (37,36%).
Experts noticed that Technology, Financials and Energy are the top 3 industries with the largest volume of credentials exposed in breaches of adult-oriented websites and resources.
Another interesting data emerged from the report, on average, 11% of the stolen passwords from one breach are identical pointing out to usage of default passwords, proliferation of [spam & data scraping] bots creating accounts, or a previous password reset setting an identical password to a large set of accounts.
“These numbers are both frustrating and alarming. Cybercriminals are smart and pragmatic, they focus on the shortest, cheapest and safest way to get your crown jewels. The great wealth of stolen credentials accessible on the Dark Web is a modern-day Klondike for mushrooming threat actors who don’t even need to invest in expensive 0day or time-consuming APTs.” concludes Ilia Kolochenko, CEO and Founder of ImmuniWeb.
“With some persistence, they easily break-in being unnoticed by security systems and grab what they want. Worse, many such intrusions are technically uninvestigable due to lack of logs or control over the breached [third-party] systems.”
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Fortune 500, dark web)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.