Settings

Theme

4M gmail addresses with passwords leaked (large html file, 150megs)

pred.me

63 points by mr_november 9 years ago · 30 comments

Reader

nilved 9 years ago

This is from 2014 and likely not a Google hack or leak but a subset of credentials revealed by hacks or leaks from other sites.

https://productforums.google.com/forum/#!topic/gmail/4q3AYMi... and https://facepunch.com/showthread.php?t=1423764 refer to this link.

Edit to add: https://haveibeenpwned.com/PwnedWebsites#BTSec

  • Karuma 9 years ago

    Indeed... My email is listed here, but it shows "password" as its password, which is completely false.

    I only use "password" in random websites that force me to register (but that I'll never visit again).

buckbova 9 years ago

Caution, this is a link to the actual emails.

  • r1ch 9 years ago

    As a 150MB HTML file. Good luck, mobile users.

  • lechevalierd3on 9 years ago

    Yeah not sure why one would link to that file directly.

    • mr_novemberOP 9 years ago

      I've changed the title to reflect the size but there is no story here without the link. What would you have done? I ask not to confront but rather to learn.

      I didn't feel completely comfortable posting the link but thought it was better that it's out there (and it looks like it's not even new according to comments).

      • tmp_cURL 9 years ago

        To download, I used:

          curl https://pred.me/gmail.html -vo /tmp/pred.me.gmail.$RANDOM.txt
        
        There appear to be no malicous/unsafe <scripts/> at the moment. No HTML tags.

        Just one email per line, and a colon (:) delimiter for the password.

        The MD5 hash is:

          c1d5f3998459acea8d32937a4485c0b7
        
        Availability is spotty. The server is refusing connections, probably due to high load.

        The IP address resolved to:

          81.4.110.159
        
        I don't think the direct link is out of line. Some users might need guidance on how to safely inspect the file.

        In terms of HN community conventions and common behaviors, people will often submit a question like "Ask HN: Lorem Ipsum..." and then provide follow-up details in the message body, including relevant information, such as the details I've provided above.

        This way, if the owner of the resource at the address starts serving up malware, users can verify the content before consuming it.

        These are merely community memes though. Not any sort of auspicious, high-minded "best practices as prescribed by experts" or anything. Just some stuff a bro might do around here.

        Also, WHOIS info might be useful, if safety or malware is a concern...

        http://whois.domaintools.com/pred.me

        This doesn't preclude the domain owner having been pwnt and used as a patsy. Or even whether that person might have a valid reason for hosting the file?

coldcode 9 years ago

I looked at the paste file. It had my gmail address (which is mostly what I use for public stuff) but the password came from only one place: travel.travelocity.com; however that user database is long gone as Travelocity is now just a brand of Expedia so that old account no longer exists. Of course I don't reuse passwords so it's not an issue. I wonder how it got there.

disposablename 9 years ago

Probably passwords from other sites, not gmail. Lists my email next to a password I've never used on gmail, or any other important site.

Flammy 9 years ago

I give this dump 12 more minutes until someone at Google uploads it to an internal tool to invalidate all of the emails listed.

  • acjohnson55 9 years ago

    Unfortunately, I wouldn't be shocked if someone out there had a tool that can escalate this exploit just as quickly.

rasz_pl 9 years ago

fake, checked 3 gmails. not only are the passwords wrong, they are random garbage that was never used with those accounts

  • cuchoi 9 years ago

    One returned me the error "You changed your password 5 months ago"

kafkaesq 9 years ago

Fascinating. Any thoughts as to how this came about?

Sephr 9 years ago

Mirror?

fiatjaf 9 years ago

Can anyone see if my name is in there?

  • simcop2387 9 years ago

    I'm sure it'll get added to haveibeenpwned.com fairly quickly. That said I'm trying to grab it for the same reason. If your email is in your HN profile I'll give it a check.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection