<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hacking - DeepNews</title>
	<atom:link href="https://deepweb.news/category/news/hack/feed/" rel="self" type="application/rss+xml" />
	<link>https://deepweb.news</link>
	<description>The deep news you need, not the fluff.</description>
	<lastBuildDate>Fri, 27 Jun 2025 14:12:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>

<image>
	<url>https://deepweb.news/wp-content/uploads/2025/05/cropped-favicon-32x32.webp</url>
	<title>Hacking - DeepNews</title>
	<link>https://deepweb.news</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The biggest password leak of Apple, Facebook, Google And Other</title>
		<link>https://deepweb.news/the-biggest-password-leak-of-apple-facebook-google-and-other/</link>
		
		<dc:creator><![CDATA[_0xfff]]></dc:creator>
		<pubDate>Mon, 23 Jun 2025 14:09:56 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[apple]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[dark web]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[leaked passwords]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">https://deepweb.news/?p=880</guid>

					<description><![CDATA[<p>June 22, 2025: This story, originally published on June 18, has been updated to include details of how to switch from passwords to the much more secure passkey technology if you are an Apple, Facebook or Google user. There is now also additional input from cybersecurity professionals regarding the 16 billion credentials mother of all [&#8230;]</p>
<p>The post <a href="https://deepweb.news/the-biggest-password-leak-of-apple-facebook-google-and-other/">The biggest password leak of Apple, Facebook, Google And Other</a> first appeared on <a href="https://deepweb.news">DeepNews</a>.</p>]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="880" class="elementor elementor-880" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-22b0f015 e-flex e-con-boxed e-con e-parent" data-id="22b0f015" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-c5c33c3 elementor-widget elementor-widget-text-editor" data-id="c5c33c3" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									
<p>June 22, 2025: This story, originally published on June 18, has been updated to include details of how to switch from passwords to the much more secure passkey technology if you are an Apple, Facebook or Google user. There is now also additional input from cybersecurity professionals regarding the 16 billion credentials mother of all leaks, including clarification regarding the legitimacy of the data leaked and the services impacted.</p>



<p>If you thought it was scary on May 23, it was confirmed that a total of 184 million login credentials had been compromised. Researchers have just confirmed what may be the largest breach of all time, with an almost unbelievable 16 billion login credentials, including passwords, exposed. As part of an ongoing investigation that began earlier this year, researchers have postulated that the massive password leak is the work of multiple infostealers. Here’s what you need to know and do.</p>



<p><strong>The biggest password leak yet?</strong></p>



<p>Password compromise is no joke; it leads to account compromise, and that leads to, well, compromise of just about everything you hold dear in this tech-centric world we live in. That’s why Google is urging billions of users to replace their passwords with much more secure passcodes. That’s why the FBI is warning people not to click on links in SMS messages. That’s why stolen passwords are for sale, by the millions, on the dark web to anyone with the minimum amount of money to buy them. And that’s why this latest revelation is, frankly, so concerning to everyone.</p>



<p>According to Vilius Petkauskas of Cybernews, who says researchers have been investigating the leak since the beginning of the year, “30 exposed data sets, containing anywhere from tens of millions to more than 3.5 billion records each,” have been discovered. In total, Petkauskas confirmed, the number of compromised records reached 16 billion. What is believed to be the largest leak of its kind in history.</p>



<p>“Intelligence agencies and threat actors use this data and accumulate these lists on the dark web,” said Lawrence Pingree, vice president of Dispersive, “sometimes repackaged multiple times, sometimes sold individually.” As Pingree told me, it’s hard to say without examining the entire dataset, deduplicating the data, and comparing it to datasets from independent breaches whether this is a repackaged leak or not. However, Cybernews’ researchers are certain it isn’t. Regardless, as Pingree put it, “16 billion records is a big number,” and these credential data “can be misused and are misused—that’s what makes them valuable.”</p>



<p>The 16 billion-data leak, housed in several supermassive datasets, includes billions of login credentials for social media, VPNs, developer portals, and user accounts from seemingly every major vendor. This has been disputed by some cybersecurity professionals, but whatever the truth, it remains a major cause for concern.</p>



<p><strong>Conclusion</strong></p>



<p>Replace your passwords with passkeys now While you may not want to replace all your account passwords as a result of this latest leak revelation, I would definitely recommend doing so if you’ve already reused some of those credentials across more than one service. Start using a password manager and switch to passkeys whenever possible.</p>
								</div>
				</div>
					</div>
				</div>
				</div><p>The post <a href="https://deepweb.news/the-biggest-password-leak-of-apple-facebook-google-and-other/">The biggest password leak of Apple, Facebook, Google And Other</a> first appeared on <a href="https://deepweb.news">DeepNews</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Israel Hackers Burn $90 Million Iran Exchange</title>
		<link>https://deepweb.news/israel-hackers-burn-90-million-iran-exchange/</link>
		
		<dc:creator><![CDATA[_0xfff]]></dc:creator>
		<pubDate>Fri, 20 Jun 2025 14:10:35 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[iran]]></category>
		<category><![CDATA[nobitex]]></category>
		<category><![CDATA[stolen]]></category>
		<category><![CDATA[war]]></category>
		<guid isPermaLink="false">https://deepweb.news/?p=900</guid>

					<description><![CDATA[<p>This incident is a glaring example of how cyberwarfare and cryptocurrencies are becoming deeply intertwined in geopolitical conflicts. The pro-Israeli hacking group Predatory Sparrow (Gonjeshke Darande) claimed responsibility for the attack on Nobitex, Iran’s largest cryptocurrency exchange, and reportedly destroyed over $90 million worth of digital assets — including Bitcoin, Ethereum, and Dogecoin — by [&#8230;]</p>
<p>The post <a href="https://deepweb.news/israel-hackers-burn-90-million-iran-exchange/">Israel Hackers Burn $90 Million Iran Exchange</a> first appeared on <a href="https://deepweb.news">DeepNews</a>.</p>]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="900" class="elementor elementor-900" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-3f6f2b9 e-flex e-con-boxed e-con e-parent" data-id="3f6f2b9" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-51fb641 elementor-widget elementor-widget-text-editor" data-id="51fb641" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									
<p>This incident is a glaring example of how cyberwarfare and cryptocurrencies are becoming deeply intertwined in geopolitical conflicts. The pro-Israeli hacking group <strong>Predatory Sparrow</strong> (Gonjeshke Darande) claimed responsibility for the attack on Nobitex, Iran’s largest cryptocurrency exchange, and reportedly <strong>destroyed over $90 million</strong> worth of digital assets — including Bitcoin, Ethereum, and Dogecoin — by sending them to <strong>non-spendable “custom” addresses</strong>.</p>



<p>These addresses were deliberately made to be inaccessible, some even containing provocative messages against Iran. The Ethereum tokens were sent to the notorious burn address <strong>“0x…dead”</strong>, and one Bitcoin wallet had an invalid checksum, rendering the funds permanently unrecoverable.</p>



<p>The hackers framed the attack as a political statement, accusing Nobitex of helping the Iranian regime <strong>evade sanctions and finance terrorism</strong>. They then leaked what they claim is the exchange’s <strong>full source code</strong>, potentially exposing it to new vulnerabilities.</p>



<p>In response, Nobitex stated that <strong>user funds are safe</strong> as the majority are stored in cold wallets. The platform also <strong>emptied its hot wallets</strong> as a precaution and cut off external access to its servers.</p>



<p>This breach not only underscores the <strong>vulnerabilities of centralized exchanges</strong>, but also highlights how cryptocurrency infrastructure is increasingly being used as a <strong>battleground for state-level cyber operations</strong>.</p>
								</div>
				</div>
					</div>
				</div>
				</div><p>The post <a href="https://deepweb.news/israel-hackers-burn-90-million-iran-exchange/">Israel Hackers Burn $90 Million Iran Exchange</a> first appeared on <a href="https://deepweb.news">DeepNews</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hackers stole crypto Coinbase &#8211; $20 million</title>
		<link>https://deepweb.news/hackers-stole-crypto-coinbase-20-million/</link>
		
		<dc:creator><![CDATA[_0xfff]]></dc:creator>
		<pubDate>Tue, 17 Jun 2025 18:14:56 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[coinbase]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[stolen]]></category>
		<guid isPermaLink="false">https://deepweb.news/?p=860</guid>

					<description><![CDATA[<p>Hackers have stolen sensitive customer data from crypto exchange Coinbase and are demanding a ransom of $20 million (17.9 million euros). The largest American trading platform for cryptocurrencies says it will not pay the ransom. Coinbase reports that criminals have bribed customer service employees to provide data such as names, addresses and copies of IDs. [&#8230;]</p>
<p>The post <a href="https://deepweb.news/hackers-stole-crypto-coinbase-20-million/">Hackers stole crypto Coinbase – $20 million</a> first appeared on <a href="https://deepweb.news">DeepNews</a>.</p>]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="860" class="elementor elementor-860" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-2f1945bd e-flex e-con-boxed e-con e-parent" data-id="2f1945bd" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-5f50626e elementor-widget elementor-widget-text-editor" data-id="5f50626e" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									
<p>Hackers have stolen sensitive customer data from crypto exchange Coinbase and are demanding a ransom of $20 million (17.9 million euros). The largest American trading platform for cryptocurrencies says it will not pay the ransom.</p>



<p>Coinbase reports that criminals have bribed customer service employees to provide data such as names, addresses and copies of IDs.</p>



<p>The hackers used this data to approach customers and pose as Coinbase employees. They tried to convince customers to transfer their crypto coins.</p>



<p>The attackers were supposed to keep their action quiet if Coinbase paid the ransom, but the company refuses to do so. However, the crypto exchange has promised to compensate customers who have lost their crypto coins. According to the company, this concerns less than 1 percent of the monthly active users.</p>



<p>The announcement of the hack has cost Coinbase dearly: the company&#8217;s share price fell by more than 4 percent. Coinbase is offering a $2 million reward for the golden tip that leads to the arrest of the criminals responsible.</p>



<p>Coinbase acquired the Dutch digital currency company Deribit last week. The acquisition involved around 2.6 billion euros.</p>
								</div>
				</div>
					</div>
				</div>
				</div><p>The post <a href="https://deepweb.news/hackers-stole-crypto-coinbase-20-million/">Hackers stole crypto Coinbase – $20 million</a> first appeared on <a href="https://deepweb.news">DeepNews</a>.</p>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/286 objects using Redis
Page Caching using Disk: Enhanced 
Content Delivery Network via Amazon Web Services: CloudFront: N/A
Minified using Redis
Database Caching using Redis

Served from: deepweb.news @ 2025-11-27 08:13:02 by W3 Total Cache
-->