Hackers are circulating at least 15 billion stolen login credentials on dark web forums, according to a new audit from cybersecurity firm Digital Shadows .
The practice of sharing stolen logins is nothing new hackers routinely scrape usernames and passwords revealed through data breaches and resell them (or give them away for free) on the dark web. But the new audit presents a clearer picture of the scope of the problem.
Digital Shadows identified 15 billion username-password pairs stemming from over 100,000 data breaches, according to the report . Roughly 5 billion of those are unique.
Some logins are more valuable than others while hackers share some passwords free of charge, logins for banks and other financial accounts sell for $70 per credential on average, according to the report. Logins for antivirus programs are priced the second-highest at $22 on average, while logins for video game platforms average just a few dollars per credential.
The dark web listings showed that hackers especially target people who work in organizations' financial departments the audit identified over 2 million accounting email addresses, and found that email addresses that contain "invoice" are the most frequently advertised.
Stolen logins can benefit hackers in multiple ways while a hacked financial account can enable them to steal money or commit bank fraud, hacked email addresses let them "move laterally" inside an organization by impersonating someone in order to gain that person's colleagues' trust and trick them into handing over even more information.
Accounts seen as especially valuable, like domain administrators for a small business or local government, are typically auctioned off on the dark web. Buyers will bid an average of $3,139 and up to $140,000 for such logins, according to the report.
"Account takeover has never been easier (or cheaper) for cybercriminals," the report's authors wrote . "Attackers will find brute force hacking and credential-stuffing a virtual cakewalk."
The report recommends that people use password managers, enable two-factor authentication as much as possible, and change their passwords frequently in order to avoid stolen credential attacks.