• Jax@l.hostux.net
    link
    fedilink
    English
    arrow-up
    13
    ·
    3 days ago

    I don’t understand how to find out which specific sites had my data leaked. Without that I can’t take any action. I’m subscribed to email alerts but the alert did not include any details like the article said it would.

    • boatswain@infosec.pub
      link
      fedilink
      English
      arrow-up
      1
      ·
      16 hours ago

      As another poster detailed, this is not a company that exposed your info: these credentials are all from stealer logs, which are logs of credentials stolen by keyloggers installed on machines. If your credentials were in this report, it means that you’ve entered that username and password on a machine with malware on it. Could be your personal machine, or it could be some other computer you’ve used.

      • Jax@l.hostux.net
        link
        fedilink
        English
        arrow-up
        2
        ·
        14 hours ago

        That’s true. My point was just that the important thing here is knowing personally which domains were affected so one can personally change those sets of credentials. If I don’t know which of my credentials leaked then there’s no value to me.

        I was able to finally get access and did change the specific credential that had leaked (again, not assigning blame to any specific site here).

    • controlphreak@lemmy.ml
      link
      fedilink
      English
      arrow-up
      17
      ·
      3 days ago

      Use the ‘Notify me’ option and verify your email address, and then it will show the expanded list of domains that were exposed from the malware:

      • Jax@l.hostux.net
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        2 days ago

        Thanks, I finally found it. I was already subscribed and verified, but still couldn’t find this anywhere. To get to it I had to:

        • Signup again from the HIBP website
        • Get the verification email telling me I was already verified
        • Click through it
        • Scroll to the VERY bottom of the page and find the stealer logs.

        My natural question is of course how my credentials were stolen logging into gmail.com (yay 2-factor), but at least know I know that’s where I need to change my password.

        I should note that the initial notice email about the breach that I received from HIBP for already being verified appears to not have any direct way to actually get this information.

      • brygphilomena@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 days ago

        Mine just said it was found, but no domains were associated. So… Yea. I don’t know what it has, and the inability to query it for more information sucks.

    • Illecors@lemmy.cafe
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 days ago

      Rent a domain Set up email Use a unique address for every website

      I usually pick the domain of the website as the username part.

      So if, say, I have email set up on lemmy.cafe and want to sign up to flatearth.com - I’d probably use flatearth.com@lemmy.cafe for an email address. If they ever leak it - I’ll be reveiving spam sent to this address.

      In the six years of hosting my own email I’ve only had one such occurence when namecheap got breached. It was nice being able to tell where the culprit was!