Stolen credentials on the Dark Web

1 October 2019 Information Security, Security Services & Risk Management

Web security company, ImmuniWeb, has conducted research into the state of stolen credentials available on the Dark Web, which are being exploited by cybercriminals for spear-phishing and password re-use attacks against the highest-grossing global public and private companies - the Fortune 500.

ImmuniWeb used its all-in-one ImmuniWeb Discovery application discovery and inventory service solution to crawl generally accessible places and resources within the TOR network, across various Web forums, Pastebin, IRC channels, social networks, messenger chats and many other locations notorious for offering, selling or distributing stolen or leaked data.

Key findings: passwords

Over 21 million (21 040 296) credentials belonging to Fortune 500 companies, among which over 16 million (16 055 871) were compromised during the last 12 months.

As many as 95% of the credentials contained unencrypted, or brute-forced and cracked by the attackers, plaintext passwords.

Perhaps unsurprisingly, technology was the industry with the largest volume of credentials exposed in breaches of adult-oriented websites and resources, followed by financials and energy.

There were only 4,9 million (4 957 093) fully unique passwords amid the 21 million records, suggesting that many users are using identical or similar passwords.

One of the most common passwords in most of the industries researched was password.

Retail was the industry with the highest number of weak or default passwords.

Approximately 42% of the stolen passwords are somehow related either to the victim’s company name or to the breached resource in question, making password brute-forcing attacks highly efficient.

On average, 11% of the stolen passwords from one breach are identical - pointing to usage of default passwords, proliferation of spam and data scraping bots creating accounts, or a previous password reset setting an identical password to a large set of accounts.

Key findings: domains

The number of squatted domains and phishing websites per organisation is proportional to the total number of exposed credentials. The more illegitimate resources exist, the more credentials can be found for the organisation’s personnel.

The number of subdomains with failing Web security grade (C or F) is proportional to the number of exposed credentials. The more poorly secured a website is, the more credentials can be found for the organisation’s personnel.

Key findings: data

Over half of publicly accessible data is outdated or fake, or just comes from historical breaches in a false pretence to be newly compromised records.

The most popular sources of the exposed breaches were:

1.Third parties (e.g. websites or other resources of unrelated organisations).

2.Trusted third parties (e.g. websites or other resources of partners, suppliers or vendors).

3.The companies themselves (e.g. their own websites or other in-house resources).

Ilia Kolochenko, CEO and founder of ImmuniWeb, commented: “These numbers are both frustrating and alarming. Cybercriminals are smart and pragmatic, they focus on the shortest, cheapest and safest way to get your crown jewels. The great wealth of stolen credentials accessible on the Dark Web is a modern-day Klondike for mushrooming threat actors who don’t even need to invest in expensive zero-day or time-consuming APTs (the Klondike Gold Rush was a migration by an estimated 100 000 prospectors to the Klondike region of the Yukon, in north-western Canada, between 1896 and 1899). With some persistence, they easily break in, being unnoticed by security systems and grab what they want. Worse, many such intrusions can technically not be investigated due to lack of logs or control over the breached [third-party] systems.

In the era of cloud, containers and continuous outsourcing of critical business processes, most organisations have lost visibility and thus control over their digital assets and data. You cannot protect what you don’t see, likewise you cannot safeguard the data if you don’t know where it’s being stored and who can access it. Third-party risks immensely exacerbate the situation by adding even more perilous unknowns into the game.

A well-thought, coherent and holistic cybersecurity and risk management programme should encompass not just your organisation but third parties in a continuous and data-driven manner.

Full research and infographics at: https://www.immuniweb.com/blog/stolen-credentials-dark-web-fortune-500.html




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Eight African cybersecurity trends for 2026
Information Security
Check Point Software Technologies has released eight critical trends shaping Africa’s digital turning point in 2026, noting that their implementation will require the government, the private sector, and key civic institutions to cooperate.

Read more...
The year of the agent
Information Security AI & Data Analytics
The dominant attack patterns in Q4 2025 included system-prompt extraction attempts, subtle content-safety bypasses, and exploratory probing. Indirect attacks required fewer attempts than direct injections, making untrusted external sources a primary risk vector heading into 2026.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...
Securing the smart fleet
Information Security Transport (Industry) Logistics (Industry) IoT & Automation
Contributing around 10 to 12% of South Africa’s GDP, the transport and logistics sector supports almost every part of the country’s economic activity. The stakes for keeping these systems secure are higher than ever before.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.