{"id":62700,"date":"2017-05-29T00:00:00","date_gmt":"2017-05-29T00:00:00","guid":{"rendered":"http:\/\/blog.mozilla.org\/foxtail\/2017\/05\/29\/password-data-breach\/"},"modified":"2017-05-29T00:00:00","modified_gmt":"2017-05-29T00:00:00","slug":"password-data-breach","status":"publish","type":"post","link":"https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/","title":{"rendered":"Has your password been hacked in a data breach? Troy Hunt can help you find out."},"content":{"rendered":"<p>As more of our important personal information is stored online behind password-protected accounts, news about data breaches sends us scrambling to find out if our passwords were hacked. One of the best places to find out is Troy Hunt\u2019s website, <a href=\"http:\/\/www.haveibeenpwned.com\">www.haveibeenpwned.com<\/a>, where anyone can input their email address to learn if it has been compromised.<\/p>\n<p>Hunt, an Australian information security expert, has spent thousands of hours studying data breaches to understand what happened and who was at risk.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-361 alignright\" src=\"http:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2017\/05\/Troy-Hunt-Profile-Photo-600x600.jpeg\" alt=\"Troy Hunt\" width=\"400\" height=\"400\" \/>\u201cI kept finding the same accounts exposed over and over again, often with the same passwords, which then put the victims at further risk of their other accounts being compromised,\u201d Hunt said.<\/p>\n<p>He became concerned that everyday people were unaware of how big the problem was. In 2013 when an Adobe customer account breach put more than 150 million user names, email addresses, passwords and password hints at risk, Hunt launched his site. He runs it on a \u201cshoestring budget\u201d out of his own pocket, and his approach has been to keep it simple and keep it free.<\/p>\n<p>Business, unfortunately, has never been better.<\/p>\n<p>\u201cData breaches have <a href=\"http:\/\/www.informationisbeautiful.net\/visualizations\/worlds-biggest-data-breaches-hacks\/\">increased dramatically<\/a> since I started, both in terms of frequency of the incidents and the scale as well.\u201d<\/p>\n<p>He points to a handful of reasons. To start, people have more devices connected to the Internet every year, from <a href=\"http:\/\/money.cnn.com\/2016\/11\/30\/technology\/android-phones-infected\/\">phones<\/a> to <a href=\"http:\/\/www.npr.org\/sections\/alltechconsidered\/2014\/01\/16\/263111193\/refrigerator-hacked-reveals-internet-of-things-security-gaps\">refrigerators<\/a> to <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings\">teddy bears<\/a>. With more connected devices and more accounts created with them, more data is being collected.<\/p>\n<p>\u201cThe cloud is another thing that has exacerbated the whole problem because as awesome as it is for many things, it also makes it very cheap to stand up services, so we\u2019re seeing more services [with logins],\u201d he said. \u201cIt\u2019s also very cheap to store data, so we see organizations hoarding information. Companies like to have as much data as they can so they can market to people.\u201d<\/p>\n<p>We\u2019re also entering the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Digital_native\">digital native<\/a> era, a time when more people are online who have never known a time when it was different.<\/p>\n<p>\u201cTheir propensity for sharing information and their sensitivity toward their personal privacy is all very different than it is for those of us who reached adulthood before we had the Internet,\u201d he said.<\/p>\n<p>All of this adds up to more information out there from a lot more sources. And not every company is doing a stellar job of protecting that information or destroying it when it\u2019s no longer needed, which makes it vulnerable.<\/p>\n<p>\u201cThe reason we have these headlines everyday is because clearly we&#8217;re not taking security seriously enough,\u201d Hunt said. \u201cThe really big stuff &#8212; like your Twitter and your Facebook &#8212; is very solid these days, and the vast volume of our Internet behavior is on sites that have done a very good job. The problem is when you get to middle or lower tier sites where you&#8217;ve got a lot less funding, and you don&#8217;t have dedicated security teams.\u201d<\/p>\n<p>\u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/Pwn\">Pwned<\/a>,\u201d which rhymes with \u201cowned,\u201d is a slang term meaning your account has been utterly defeated, cracked and, yes, owned. Shortly after his site\u2019s launch, Hunt added a feature where one can <a href=\"https:\/\/haveibeenpwned.com\/notifyme\">sign up to be notified<\/a> if email address gets pwned in future data leaks. In February 2017, he hit one million subscribers. When Hunt started, he poked around in forums, dark web sites and even public web sites to find leaked data. What he discovered was fascinating.<\/p>\n<p>\u201cThere is this whole scene where people share data breaches,\u201d he said. \u201cIt&#8217;s very often kids, young males, teenagers, who are hoarding data. They collect as much as they can, and they exchange it like they would baseball cards. Except unlike with baseball cards, when you exchange data, you still have the original as well.\u201d<\/p>\n<p>Sometimes data is also sold. When the LinkedIn data breach occurred, it was traded for five bitcoins or several thousand U.S. dollars at the time. Hunt says the data is not typically used to break into the account from which it was hacked. Rather it\u2019s used in an attempt to break into other accounts, such as your bank or your email, which is often the best way to unlock an account. If you reuse passwords, you\u2019re putting yourself at risk.<\/p>\n<p>Today, people get in touch with Hunt when they come across a data breach.<\/p>\n<p>\u201cFortunately I have a reliable trustworthy network that sends me information and makes it a lot easier to maintain the service. It would be very hard for me to go out and source all of this myself.\u201d<\/p>\n<p>Hunt takes great care when he learns of a data breach. His first step is to determine if it\u2019s legitimate.<\/p>\n<p>\u201cA lot of the stuff out there is fake,\u201d he said. \u201cFor example there&#8217;s a lot of news at the moment about Spotify accounts, and these Spotify accounts are just reused names and passwords from other places. They weren&#8217;t hacked out of Spotify.\u201d<\/p>\n<p>Once that box is checked, he reaches out to the company to alert them, which he says is a surprising challenge. Though he works hard to responsibly disclose the breaches to the companies affected, he has many stories of companies who ignore alerts that their customer data has been compromised. Finally, he loads the email accounts onto his site alongside those from MySpace, xBox 360, Badoo, Adobe, Elance and <a href=\"https:\/\/haveibeenpwned.com\/PwnedWebsites\">many more<\/a>.<\/p>\n<p>Hunt also gives talks about information security to audiences around the world with the goal of getting more businesses and developers to approach projects with a defensive mentality. One of his sessions is a <a href=\"https:\/\/www.troyhunt.com\/workshops\/\">\u201cHack yourself first\u201d<\/a> workshop that shows developers how to break into their own work, giving them an opportunity to see offensive techniques first-hand.<\/p>\n<p>\u201cThere&#8217;s like a lightbulb that goes off when people do get first-hand experience with that,\u201d he said. \u201cIt&#8217;s enormously powerful as a way of learning.\u201d<\/p>\n<table bgcolor=\"FFED00\">\n<tbody>\n<tr>\n<td>\n<h2>What can you do?<\/h2>\n<p>At Mozilla, we believe cybersecurity is a <a href=\"https:\/\/blog.mozilla.org\/blog\/2016\/09\/13\/cybersecurity-is-a-shared-responsibility\/\">shared responsibility<\/a>, and your actions help make the Internet a safer, healthier place.<\/p>\n<h3><b>Be smart about your logins <\/b><\/h3>\n<p>As an Internet citizen, there are a few fundamental things you can do to boost your account security online:<\/p>\n<ol>\n<li>Use unique passwords.<\/li>\n<li>Since it\u2019s difficult to remember so many unique passwords, use a password manager.<\/li>\n<li>Use multi-step verification<\/li>\n<\/ol>\n<p>Check out Mozilla\u2019s <a href=\"https:\/\/blog.mozilla.org\/internetcitizen\/2017\/01\/25\/better-password-security\/\">Guide to Safer Logins<\/a>, which covers these tips in more depth.<\/p>\n<h3><a href=\"https:\/\/advocacy.mozilla.org\/en-US\/stay-secure\/\"><b>Update your software<\/b><\/a><\/h3>\n<p>It&#8217;s all too easy to ignore software update alerts on your phone and computer, but your cybersecurity may depend on them. Updating to the latest security software, browser and operating system provides an important defense against viruses, malware and other online threats like the recent <a href=\"http:\/\/time.com\/4779750\/wannacry-ransomware-patch-windows-cybersecurity\/\">WannaCry<\/a> ransomware attack.<\/p>\n<h3><b>Use Lean Data Practices <\/b><\/h3>\n<p>As a business or developer that handles data, you should always be working to create a more trusted relationship with your users around their data. Building trust with your users around their data doesn\u2019t have to be complicated. But it does mean that you need to think about user privacy and security in every aspect of your product. <a href=\"https:\/\/www.mozilla.org\/about\/policy\/lean-data\/\">Lean Data Practices<\/a> are simple, and even come with a toolkit to make them easy to implement:<\/p>\n<ol>\n<li>Stay lean by focusing on data you need,<\/li>\n<li>Build in security appropriate to the data you have and<\/li>\n<li>Engage your users to help them understand how you use their data.<\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>As more of our important personal information is stored online behind password-protected accounts, news about data breaches sends us scrambling to find out if our passwords were hacked. One of the best places to find out is Troy Hunt\u2019s website, www.haveibeenpwned.com, where anyone can input their email address to learn if it has been compromised. [&hellip;]<\/p>\n","protected":false},"author":727,"featured_media":21598,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[],"coauthors":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Has your password been hacked in a data breach? | Mozilla Internet Citizen<\/title>\n<meta name=\"description\" content=\"Worried that your password may have been compromised in a data breach? One of the best places to find out is Troy Hunt\u2019s website, haveibeenpwned.com.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/\",\"url\":\"https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/\",\"name\":\"Has your password been hacked in a data breach? | Mozilla Internet Citizen\",\"isPartOf\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2017\/05\/moz_blog_internet-citizen_troy-hunt-pwned.jpg\",\"datePublished\":\"2017-05-29T00:00:00+00:00\",\"dateModified\":\"2017-05-29T00:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/5c987afc4f606be73692d2acfdd1316c\"},\"description\":\"Worried that your password may have been compromised in a data breach? One of the best places to find out is Troy Hunt\u2019s website, haveibeenpwned.com.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/#primaryimage\",\"url\":\"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2017\/05\/moz_blog_internet-citizen_troy-hunt-pwned.jpg\",\"contentUrl\":\"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2017\/05\/moz_blog_internet-citizen_troy-hunt-pwned.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.mozilla.org\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Has your password been hacked in a data breach? Troy Hunt can help you find out.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/#website\",\"url\":\"https:\/\/blog.mozilla.org\/en\/\",\"name\":\"The Mozilla Blog\",\"description\":\"News and Updates about Mozilla\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.mozilla.org\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/5c987afc4f606be73692d2acfdd1316c\",\"name\":\"M.J. Kelly\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/image\/70718b02fa9f11d88288b937f1da2ac1\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d61ff6a9eb6dd324df20cb773e6c416e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d61ff6a9eb6dd324df20cb773e6c416e?s=96&d=mm&r=g\",\"caption\":\"M.J. Kelly\"},\"description\":\"Mozilla Communications\",\"url\":\"https:\/\/blog.mozilla.org\/en\/author\/mjkellymozilla-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Has your password been hacked in a data breach? | Mozilla Internet Citizen","description":"Worried that your password may have been compromised in a data breach? One of the best places to find out is Troy Hunt\u2019s website, haveibeenpwned.com.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/","url":"https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/","name":"Has your password been hacked in a data breach? | Mozilla Internet Citizen","isPartOf":{"@id":"https:\/\/blog.mozilla.org\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/#primaryimage"},"image":{"@id":"https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2017\/05\/moz_blog_internet-citizen_troy-hunt-pwned.jpg","datePublished":"2017-05-29T00:00:00+00:00","dateModified":"2017-05-29T00:00:00+00:00","author":{"@id":"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/5c987afc4f606be73692d2acfdd1316c"},"description":"Worried that your password may have been compromised in a data breach? One of the best places to find out is Troy Hunt\u2019s website, haveibeenpwned.com.","breadcrumb":{"@id":"https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/#primaryimage","url":"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2017\/05\/moz_blog_internet-citizen_troy-hunt-pwned.jpg","contentUrl":"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2017\/05\/moz_blog_internet-citizen_troy-hunt-pwned.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mozilla.org\/en\/firefox\/password-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.mozilla.org\/en\/"},{"@type":"ListItem","position":2,"name":"Has your password been hacked in a data breach? Troy Hunt can help you find out."}]},{"@type":"WebSite","@id":"https:\/\/blog.mozilla.org\/en\/#website","url":"https:\/\/blog.mozilla.org\/en\/","name":"The Mozilla Blog","description":"News and Updates about Mozilla","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mozilla.org\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/5c987afc4f606be73692d2acfdd1316c","name":"M.J. Kelly","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/image\/70718b02fa9f11d88288b937f1da2ac1","url":"https:\/\/secure.gravatar.com\/avatar\/d61ff6a9eb6dd324df20cb773e6c416e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d61ff6a9eb6dd324df20cb773e6c416e?s=96&d=mm&r=g","caption":"M.J. Kelly"},"description":"Mozilla Communications","url":"https:\/\/blog.mozilla.org\/en\/author\/mjkellymozilla-com\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/posts\/62700"}],"collection":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/users\/727"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/comments?post=62700"}],"version-history":[{"count":0,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/posts\/62700\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/media\/21598"}],"wp:attachment":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/media?parent=62700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/categories?post=62700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/tags?post=62700"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/coauthors?post=62700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}