Processing 630 Million More Pwned Passwords, Courtesy of the FBI

Date:

Share post:

The sheer scope of cybercrime can be hard to fathom, even when you live and breathe it every day. It’s not just the volume of data, but also the extent to which it replicates across criminal actors seeking to abuse it for their own gain, and to our detriment.

We were reminded of this recently when the FBI reached out and asked if they could send us 630 million more passwords. For the last four years, they’ve been sending over passwords found during the course of their investigations in the hope that we can help organisations block them from future use. Back then, we were supporting 1.26 billion searches of the service each month. Now, it’s… more:

Just as it’s hard to wrap your head around the scale of cybercrime, I find it hard to grasp that number fully. On average, that service is hit nearly 7 thousand times per second, and at peak, it’s many times more than that. Every one of those requests is a chance to stop an account takeover. But the real scale goes well beyond the API itself. Because the data model is open source and freely available, many organisations use the Pwned Passwords Downloader to take the entire corpus offline and query it directly within their own applications. That tool alone calls the API around a million times during download, but the resulting data is then queried… well, who knows how many times after that. Pretty cool, right?

This latest corpus of data came to us as a result of the FBI seizing multiple devices belonging to a suspect. The data appeared to have originated from both the open web and Tor-based marketplaces, Telegram channels and infostealer malware families. We hadn’t seen about 7.4% of them in HIBP before, which might sound small, but that’s 46 million vulnerable passwords we weren’t giving people using the service the opportunity to block. So, we’ve added those and bumped the prevalence count on the other 584 million we already had.

We’re thrilled to be able to provide this service to the community for free and want to also quickly thank Cloudflare for their support in providing us with the infrastructure to make this possible. Thanks to their edge caching tech, all those passwords are queryable from a location just a handful of milliseconds away from wherever you are on the globe.

If you’re hitting the API, then all the data is already searchable for you. If you’re downloading it all offline, go and grab the latest data now. Either way, go forth and put it to good use and help make a cybercriminal’s day just that much harder 😊

Have I Been Pwned

Source link

spot_img

Related articles

Podcast #848 – Weekly DDR5 Discussion, AMD Redstone, Steam on Windows 7, Noctua 3D Filament, Cyberpunk Police +more!

There are FOUR lights!But besides that, we have AMD news on Redstone, their B650 chipset and so much...

Hidden Pitfalls of DIY WeWeb Development and When You Should Call a Pro

There is something exciting about opening WeWeb for the first time. The clean interface, the visual builder, the...

AI data center boom could be bad news for other infrastructure projects

Improvements to roads, bridges, and other infrastructure could take a hit as data center construction accelerates, according to...

35 Upcoming Nintendo Switch 1 & 2 Games To Look Forward To In 2026

Following The Game Awards 2025, which was full of Switch 2 announcements, we've given this list a big...