Millions at Risk of Identity Theft Due to Uncovered Cache of Social Security Numbers

In a recent development within the realm of cybersecurity, UpGuard researchers uncovered a substantial data breach involving a publicly accessible database that potentially contained an extensive array of sensitive personal information belonging to Americans. Greg Pollock, director of research at UpGuard, expressed a mix of fatigue and surprise after discovering this breach in January, prompting immediate investigative actions to verify the integrity of the data involved.

The exposed database reportedly included an astonishing total of approximately 3 billion email addresses and passwords, alongside roughly 2.7 billion entries that featured Social Security numbers. While not every record represented unique or valid data, the scale of the breach raised significant alarms. It appeared that the database may have been compiled from various historical data breaches, potentially including data from the 2024 breach of the background-checking service National Public Data. The practice of aggregating old datasets is commonplace among data brokers and cybercriminals, making the potential risk of compromised Social Security numbers particularly concerning, even if a portion only represented valid information.

Pollock noted that while similar findings often emerge frequently, the scale and implications of this discovery warranted further scrutiny. He emphasized that, although the identities associated with this breach faced exposure, not all had been actively exploited by malicious actors. This indicates a gap in awareness, where victims may be unaware that their information has been compromised but remains vulnerable.

The database was found hosted by the German cloud provider Hetzner. Unable to identify the database’s owner for direct communication, Pollock promptly alerted Hetzner on January 16. This notification led the provider to inform its client, resulting in the removal of the exposed data by January 21.

Due to the sensitive nature and enormous size of the dataset, UpGuard researchers focused their analysis on a sample of 2.8 million records, representing only a fraction of the breach. Their investigation revealed trends indicating that much of the data likely originated in the United States around 2015. This was evidenced by the prevalence of culturally relevant references in password choices, such as those related to popular music groups at the time, illustrating how old data can still showcase insights into societal trends at a given period.

Despite being outdated, old datasets remain valuable to cybercriminals for two primary reasons. First, individuals commonly reuse email addresses and passwords across multiple platforms, allowing attackers to exploit these credentials over time. Second, Social Security numbers are a cornerstone of identity theft, remaining constant throughout an individual’s lifetime and thus serving as a highly sought-after asset for malicious actors.

In their review of the sample data, researchers found that approximately one in four Social Security numbers seemed authentic, potentially translating to around 675 million valid entries if projected across the entire dataset. Even this fraction poses a substantial threat in terms of identity theft and other cybercrimes.

To further validate their findings, UpGuard researchers reached out to several individuals whose data was present in the compromised dataset. Alarmingly, many individuals reported that they had not experienced identity theft or hacking attempts, highlighting that a portion of this information had not yet been exploited. This underlines an urgent need for awareness among potential victims regarding the status of their exposed data, as the threat persists even when exploitation has not yet occurred.

Source