Five unanswered questions about massive Russian hacker database

Lots of questions follow Tuesday's revelation of the amassing of 1.2 billion credentials by Russian hackers

There's still much that's unclear about Tuesday's revelation that a small group of hackers in Russia have amassed a database of 1.2 billion stolen user IDs and passwords. The company that disclosed the incident, Hold Security, didn't offer any fresh information Wednesday, but here are five questions we'd like to see answered (and a bonus one that we already know the answer to).

Where did the credentials come from?

Hold Security said the hacking group started out buying stolen credentials on the black market, then used those credentials to launch other attacks. But it's unclear how many credentials they bought and how many of the 1.2 billion they culled themselves. Without that information, it's hard to know how fresh -- and hence how valuable -- the stolen data is.

What websites are they for?

If the hackers managed to recently penetrate major websites, like financial or email services, then it's time to change your password. But if the data comes from mainly smaller sites, the value of the credentials is likely lower -- unless people reused the same password they use for sensitive accounts. You do have unique passwords for important accounts, don't you?

What are the hackers going to do with them?

The answer to this depends partly on the previous two questions. If they are fresh credentials for important services like online banking, they are ripe to be used to siphon money from online accounts. If they are older or from little-used services, they might be used to send spam by email or post it in online forums.

Were the passwords hashed, and how?

Even most small websites don't store passwords as plain text these days, but the scrambling system used to protect passwords called "hashing" offers varying degrees of protection. An older one called "MD5" can be attacked with brute force and broken in a few minutes -- faster if the password is something common like "password123" -- but a more modern and secure method takes longer to break and so is more costly.

Was I affected?

This is the big question for every Internet user. Hold Security says you can sign up for a forthcoming service that will notify you if your details were included. Website operators are being offered a US$120-a-year service that will notify them if their user accounts appear in this or other hacker databases.

Passwords aren't that secure, are they?

Nope, especially as most people implement them today. That's why major websites including Gmail, Facebook and Twitter offer two-factor authentication that requires a password and an ever-changing code produced by a smartphone app, or offer to send a login token via SMS when users connect from a new computer. Security companies are working on new methods for authentication, but it's an ever-continuing cat-and-mouse game with hackers.

Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address is

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags securitydata breachHold Security

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Martyn Williams

IDG News Service
Show Comments

Cool Tech

D-Link TAIPAN AC3200 Ultra Wi-Fi Modem Router (DSL-4320L)

Learn more >

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

ASUS ROG Swift PG279Q – Reign beyond virtual world

Learn more >

Xiro Drone Xplorer V -3 Axis Gimbal & 1080p Full HD 14MP Camera

Learn more >

D-Link PowerLine AV2 2000 Gigabit Network Kit

Learn more >

Crucial® BX200 SATA 2.5” 7mm (with 9.5mm adapter) Internal Solid State Drive

Learn more >

Gadgets & Things

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

Lexar Professional 2000x SDHC™/SDXC™ UHS-II cards

Learn more >


Learn more >

Family Friendly

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

ASUS VivoPC VM62 - Incredibly Powerful, Unbelievably Small

Learn more >

Lexar Professional 2000x SDHC™/SDXC™ UHS-II cards

Learn more >

Stocking Stuffer

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

Lexar Professional 2000x SDHC™/SDXC™ UHS-II cards

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Best Deals on Good Gear Guide

Latest News Articles


GGG Evaluation Team

Kathy Cassidy


First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni


For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell


The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi


The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott


My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.


Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?