How to spot if your password was stolen in a security breach

1 March 2019 Information Security

“Following the revelation that a list of millions of stolen usernames and passwords had appeared online, we share a few different ways to find out if your credentials were stolen in any security breach”, says Carey van Vlaanderen, CEO at ESET South Africa.

In mid-January, researcher Troy Hunt revealed that a list was floating around in the storage space of MEGA cloud as well as in several hacking forums. Going by the name of Collection#1, it contains the largest theft of passwords organised into a list to date, comprising more than 700 million email addresses and more than 20 million passwords.

Once we hear something about this, it is only natural that we might wonder if our own email addresses and/or passwords we use to access our accounts are among them, or if they have been snatched as part of any other infiltration or security breach. Discovering if our credentials have been robbed or not can also give us an idea of whether the passwords we are choosing when we register with a new service, or when we update our password, are sufficiently secure. In this article we will tell you how to find out if your email address or password has been stolen and to check if passwords you are choosing are secure or not.

The first service we are going to look at is Have I Been Pwned. This service allows users to check if their email address has been stolen and included in any of the various lists of email and password information circulating online. Furthermore, their address database is kept up to date and includes the emails and passwords which were stolen recently.

Upon entering the site, the user will be able to view a database of more than 6 billion accounts which have at some point been stolen.

ESET decided to check an email address and saw that unfortunately the address entered had indeed been stolen at some point. Scrolling in the page, they saw more details of the types of services that compromised the email address that was being checked.

The information is sorted by date and by the hacked sites where the information was stolen. For example, there are well-known cases such as the LinkedIn and Taringa data breaches, as well as some of the lists which regularly do the rounds and contain data collated from various websites.

Once we know this, what can they do? It goes without saying that users should change their passwords on the websites mentioned, but it is also very common for people to use the same credentials for more than one website or service, so the user needs to change the stolen passsword on all the websites they use it on, because once their password is in someone else’s hands, we cannot know how many different websites they might try and log into with those credentials.

When it comes to choosing a new password we recommend another very useful tool on the same website. This time, the website tells you how many times the password you enter has been used and subsequently stolen.

Another important thing to keep in mind when choosing a secure password, besides checking if it appears in any database of stolen passwords, is to follow good practices.

Use a combination of alphanumeric characters

• Use special characters

• It should be at least eight characters long (and more than 10 will give you even more security against a brute force attack)

• In addition, consider using two-factor authentication, which adds a second layer of security on top of your chosen password.

But the most important thing is for it to be easy for us to remember, because if racking our brains to think of it results in writing it down on a piece of paper or, even worse, sticking it to the bottom of the monitor – or indeed any of the other myriad solutions we have come across – then all the security measures we have used will prove to be worthless.

For users who use a password manager such as KeePass, which allows you to generate more secure combinations and store them encrypted with the password manager itself, there is the option to compare all the passwords you have in it against a Have I been Pwned database, thanks to a tool published on GitHub.

The application is called kdbxpasswordpwned and it allows you to automatically compare all the passwords you have stored in KeePass versus the database of stolen passwords. The application is aimed at users with above-average technical knowledge.)

And to give one last tip, we should be wary if we receive emails in which the sender tries to extort money out of us on the grounds that they have our passwords. At ESET, the company has seen fake sextortion campaigns are still taking place, in which the recipient is sent an email containing their password in the message (either in the subject line or in the first few lines of body text) and is asked to pay an amount of money.

Remember to change your passwords regularly, even if the applications and services you use don’t ask you to and use two-factor authentication on the services that allow it. By doing so, you can keep your personal data more secure and reduce chances of someone else gaining access to it.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.