Saturday, June 28, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Data Security Security Bloggers Network Threats & Breaches 

Home » Promo » Cybersecurity » Does the Mother Of All Breaches Matter?

SBN

Does the Mother Of All Breaches Matter?

by Enzoic on June 11, 2024

What is the Mother of All Breaches? 

In January of 2024, security researcher Bob Dyachenko discovered a supermassive data leak, consisting of an astounding 12 terabytes of information and containing over 26 billion records.

The leak involved many platforms’ user data from popular applications like Venmo, Adobe, LinkedIn, Twitter, Weibo, Tencent, and more, and included credentials as well as other personally identifiable information. The breach rapidly became front page news under the name Mother of All Breaches—or MOAB for short.

Techstrong Gang Youtube
AWS Hub

The MOAB  includes records from thousands of well-organized and reindexed leaks, breaches, and privately sold databases.

Does the Mother of All Breaches Matter? 

Yes and No.

Despite MOAB being a rather impactful headline, whether or not the breach matters is a matter of slight debate, given the vast majority of material was from previous breaches. Known as a “COMB” or compilation of many breaches, the data has likely been available on the dark web for a while. Not many pieces of data were considered newly stolen.

However, every time a breach occurs the collective impact increases. Especially with the amount of password reuse, the (re)selling and redistribution of these details will definitely increase the number of ransomware attacks, spam calls, and phishing emails. Considering some of the other sites involved in the breach—Dropbox and MyFitnessPal were also among those impacted—it’s very likely the affected passwords were being reused across accounts. In turn, this puts a significant number of organizations at risk of Account Takeover.

In essence: consequences will arise and only time will show how far-reaching this MOAB is.

What’s the biggest data breach in history? 

While there was some talk from CyberNews and McAfee about this breach being the biggest in history, “MOAB” is a bit of a misnomer. If discussing newly exposed data, the MOAB isn’t in the running. The “biggest data breach” certainly involves billions of pieces of data, after which it could be argued the scale becomes rather irrelevant. That said, the MOAB is certainly easily considered one of the “biggest in history” given the sheer number of records (re)published at once.

This brings us back to the question of whether or not the MOAB ‘matters’. The real conclusion is that all breaches have an impact—not just the largest ones and certainly not the most publicized ones. Smaller breaches can present an outsized risk because they’re not as socialized, they’re more frequent, and they may be the result of highly targeted attacks.

What should businesses do about the Mother Of All Breaches? 

Whether or not the business in question has been using the sites with credentials leaked in the January 2024 MOAB, the steps to protect customers and employees are the same:

  1. Screen for compromised credentials
    Enzoic’s credential screening solutions continuously monitor user credentials against a database of compromised passwords and known threats. By identifying compromised credentials in real-time, institutions can prevent unauthorized access and proactively mitigate the risk of account takeover. Enzoic’s threat research team uses cutting-edge methods to gain access to compromised credentials long before they become part of aggregated datasets. In the previously mentioned cases of the MyFitnessPal and Dropbox breaches, for example, Enzoic researchers obtained the data over 4 years before they appeared in the MOAB.
  2. Follow NIST password guidelines
    For organizations and IT professionals alike, NIST guidelines and the NIST cybersecurity framework can quickly become the foundation for best practices in data security.
  3. Education
    Educating your employees and customers about the implications of password reuse, as well as the impact of data breaches on their personal safety, is a tricky process. Finding familiar points of knowledge is a good first step, whether someone is a Taylor Swift or a football fan.

It’s unfortunate, but likely, that the MOAB is the first of many compilation breaches we’ll see in the next few years. While the impact might not be as much of an emergency as data breaches with fresh material, the organization and availability of the data underscore worries in the risk management ecosystem—namely that stolen PII is being widely used for nefarious purposes, and most companies are in no way adequately protected. Now is the right time to take preventative steps to keep your company safe.

*** This is a Security Bloggers Network syndicated blog from Blog | Enzoic authored by Enzoic. Read the original post at: https://www.enzoic.com/blog/does-the-mother-of-all-breaches/

June 11, 2024June 11, 2024 Enzoic account takeover, credential screening, Cybersecurity, Data breaches
  • ← Risks of poor PKI management
  • Securing the Unseen: Protecting Sensitive Information in Highly Regulated Industries →

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

Upcoming Webinars

Securing Vibe Coding: Addressing the Security Challenges of AI-Generated Code
How to Spot and Stop Security Risks From Unmanaged AI Tools

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

N. Korean Group BlueNoroff Uses Deepfake Zoom Calls in Crypto Scams
WhatsApp BANNED by House Security Goons — But Why?
Heightened Cyber Threat from Iran Sparks Urgent Calls for Vigilance and Mitigation
DataKrypto and Tumeryk Join Forces to Deliver World’s First Secure Encrypted Guardrails for AI LLMs and SLMs
LapDogs Campaign Shows Chinese Groups’ Growing Use of ORB Networks
Black Hat SEO Poisoning Search Engine Results For AI to Distribute Malware
OpenAI Used Globally for Attacks – FireTail Blog
The Security Fallout of Cyberattacks on Government Agencies
Application and API Security Can’t Rely Solely on Perimeter Defenses or Scanners | Notes on Gartner AppSec Research | Contrast Security
What Water Utilities Need to Know About HMI Security and AI Solutions

Industry Spotlight

WhatsApp BANNED by House Security Goons — But Why?
Application Security Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security DevOps Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

WhatsApp BANNED by House Security Goons — But Why?

June 24, 2025 Richi Jennings | 4 days ago 0
Scattered Spider Targets Aflac, Other Insurance Companies
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence 

Scattered Spider Targets Aflac, Other Insurance Companies

June 22, 2025 Jeffrey Burt | Jun 22 0
US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency
Analytics & Intelligence Blockchain Cyberlaw Cybersecurity Data Privacy Digital Currency Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches 

US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency

June 20, 2025 Richi Jennings | Jun 20 0

Top Stories

‘IntelBroker’ Hacker Arrested for Wave of High-Profile Data Breaches
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

‘IntelBroker’ Hacker Arrested for Wave of High-Profile Data Breaches

June 28, 2025 Jeffrey Burt | 7 hours ago 0
Abstract Security Adds Data Lake to Reduce Storage Costs
Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

Abstract Security Adds Data Lake to Reduce Storage Costs

June 27, 2025 Michael Vizard | Yesterday 0
N. Korean Group BlueNoroff Uses Deepfake Zoom Calls in Crypto Scams
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Malware Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence 

N. Korean Group BlueNoroff Uses Deepfake Zoom Calls in Crypto Scams

June 26, 2025 Jeffrey Burt | 2 days ago 0

Security Humor

Randall Munroe’s XKCD ‘Interoperability’

Randall Munroe’s XKCD ‘Interoperability’

Download Free eBook

The Dangers of Open Source Software and Best Practices for Securing Code

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×