CyberQP
FeedChatSaved
Featured image

A major data leak from Naz.API has exposed over 70 million accounts, raising significant security concerns. Investigator Troy Hunt highlighted the risk of infostealers and credential stuffing attacks. Users should immediately rotate credentials and implement multi-factor authentication to protect their data.

Naz.API Breach: Data of 70M Accounts Exposed

Key Takeaways

  • Data breach affects over 70 million accounts.
  • 34.97% of emails were new to the data set.
  • Use multi-factor authentication for protection.
  • Rotate credentials and limit privileged access.
  • Adopt Just-in-Time access to enhance security.
Show less
2 min read

Naz.API Leaks Data from Over 70 Million Accounts


A report from Troy Hunt, the creator of the website Have I Been Pwned, alerted readers to a major data leak from Naz.API, a database containing data from over 70 million accounts and over a billion unique records. Hunt’s investigation has revealed “a significant volume of new data” and newly compromised accounts, and these accounts’ owners are at risk.


According to the report, a “well-known,” unnamed technology firm discovered the dataset in a hacking forum post published in September 2023, through a bug bounty submission, and contacted Hunt with these details.


An investigation into these findings revealed that 34.97% (over one-third) of the email addresses in this dataset were new, and not available in Have I Been Pwned’s database. The report’s findings indicate that these credentials were compiled from infostealers exfiltrating credentials from compromised endpoints and environments, and data stolen in several credential stuffing attacks and previous breaches. (In fact, Hunt also recognized his own information from an illegal website that allowed threat actors to search for people’s data.)


The report also shared a screenshot of the stealer logs, which contained a URL to login, an email address to log in, and the password in his findings.



In total, Hunt identified 319 files, with a total file size of 104 GB. He was also able to verify that the credentials were real by contacting several people listed in these infostealer logs, and by using website password request forms or registration forms to confirm that the email address exists in their account bases.



Are You Rotating Your Credentials?

The size of this data leak poses a major risk to MSPs and end users alike, and truly emphasizes the risks associated with stale or reused credentials and standing privilege, such as persistent admin accounts.

Are You Implementing Zero Standing Privilege?

That’s why security best practices require individuals and organizations to mitigate their risk by regularly rotating critical credentials, and limiting privileged access through solutions like Just-in-Time access.


CyberQP’s security experts recommend that concerned MSPs and end users take the following actions to mitigate their risk:

  • Check if your data has been compromised with a service like Have I Been Pwned.
  • Add another layer of protection to your key accounts, including complex passwords or passphrases and multi-factor authentication (2FA/MFA).
  • For privileged accounts, utilize a password vault and implement additional protection, such as end user identity verification.
  • MSPs can implement a moving target defense for their privileged accounts by regularly rotating credentials to deter threat actors and prevent them from achieving a foothold in your environment or executing lateral movement attacks.
  • MSPs can also reduce their attack surface with Just-in-Time accounts that only grant privileged access for the amount of time a user needs it. Solutions like these also enable them to meet compliance and cyber insurance best practices by achieving zero standing privilege.


CyberQP redefines Zero Trust Helpdesk Security with leading-edge Privileged Access Management (PAM) and End-User Access Management (EUAM) solutions. Our platform enables secure elevated access for both technicians and end users, along with robust self-serve and identity verification capabilities. Backed by SOC 2 Type 2 certification, we empower IT professionals to eliminate identity and privileged access security risks, enforce compliance, and enhance operational efficiency. Our mission is simple: “Empowering Access, Redefining Privilege” for help desks around the globe. To learn more visit: https://cyberqp.com/tours

https://cyberqp.com/post/naz-api-leaks-data-from-over-70-million-accounts/
Play

Naz.API Leaks Data from Over 70 Million Accounts

Related To QGuard
Why Least Privilege Access Is an IT Team Essential | CyberQP Blog
Why Least Privilege Access Is an IT Team Essential | CyberQP Blog
WEBPAGE - AI SUMMARY
The $16 Billion Wake-Up Call: Why Stale Accounts Are a Silent Threat to Your Helpdesk
The $16 Billion Wake-Up Call: Why Stale Accounts Are a Silent Threat to Your Helpdesk
WEBPAGE - AI SUMMARY
Why Rotate Privileged Account Passwords?
Why Rotate Privileged Account Passwords?
WEBPAGE - AI SUMMARY
Why MSPs and SMBs Need a Cybersecurity Partner for their Privileged Accounts
Why MSPs and SMBs Need a Cybersecurity Partner for their Privileged Accounts
WEBPAGE - AI SUMMARY
CyberQP Releases Groundbreaking Zero Trust Helpdesk Security Platform to Eliminate Standing Privileges
CyberQP Releases Groundbreaking Zero Trust Helpdesk Security Platform to Eliminate Standing Privileges
WEBPAGE - AI SUMMARY
Content For Managed Service Providers (MSPs)
How Privileged Access Management (PAM) Protects Against Breaches
How Privileged Access Management (PAM) Protects Against Breaches
WEBPAGE - AI SUMMARY
CyberQP Enhances MSP Cybersecurity Programs with New Just-in-Time Privileged Account Feature
CyberQP Enhances MSP Cybersecurity Programs with New Just-in-Time Privileged Account Feature
WEBPAGE - AI SUMMARY
It is 2025. Is Your Privileged Password Rotation Still Not Automated
It is 2025. Is Your Privileged Password Rotation Still Not Automated
WEBPAGE - AI SUMMARY
Introducing The Future of Zero Trust Helpdesk Security: Meet the Comprehensive CyberQP Platform
Introducing The Future of Zero Trust Helpdesk Security: Meet the Comprehensive CyberQP Platform
WEBPAGE - AI SUMMARY
SentinelOne Breach Reveals Modern Access Risk | CyberQP Blog
SentinelOne Breach Reveals Modern Access Risk | CyberQP Blog
WEBPAGE - AI SUMMARY
Similar to Naz.API Leaks Data from Over 70 Million Accounts
How CyberQP Helps You Stay Compliant Without the Complexity
How CyberQP Helps You Stay Compliant Without the Complexity
WEBPAGE - AI SUMMARY
Attackers Don’t Hack, They Just Ask: Lessons from the Clorox Breach
Attackers Don’t Hack, They Just Ask: Lessons from the Clorox Breach
WEBPAGE - AI SUMMARY
How Modern MSPs Simplify Onboarding of New Customers
How Modern MSPs Simplify Onboarding of New Customers
WEBPAGE - AI SUMMARY
Why EUE Belongs in Your Helpdesk Stack
Why EUE Belongs in Your Helpdesk Stack
WEBPAGE - AI SUMMARY
CyberQP + CMMC: Enabling Privileged Access and Identity Controls for Compliance Overview
CyberQP + CMMC: Enabling Privileged Access and Identity Controls for Compliance Overview
WEBPAGE - AI SUMMARY
Newest Content
When is Traditional Cybersecurity Not Enough? Protect Layer 8.
When is Traditional Cybersecurity Not Enough? Protect Layer 8.
WEBPAGE - AI SUMMARY
How An MSP Stopped a Healthcare Breach with CyberQP
How An MSP Stopped a Healthcare Breach with CyberQP
WEBPAGE - AI SUMMARY
How CyberQP Helps Partners Align with the CMMC Framework
How CyberQP Helps Partners Align with the CMMC Framework
WEBPAGE - AI SUMMARY
How MSPs Can Secure Their Technicians and Manage Tier 1 Tickets with Their PSA
How MSPs Can Secure Their Technicians and Manage Tier 1 Tickets with Their PSA
WEBPAGE - AI SUMMARY
Feature Update: Introducing Granular SSO Controls
Feature Update: Introducing Granular SSO Controls
WEBPAGE - AI SUMMARY
Powered by Navless.ai