In a rather shocking revelation of the CoMB cyberattack, has been reported that more than 3 billion various email IDs and passwords were leaked on a hacking forum.

Although data leaks of this kind aren’t unheard of, this particular cyberattack is extremely concerning because of the involvement of a significant number of accounts. The affected accounts are of private users with individual login credentials, email IDs, and passwords.

The ‘CoMB’:

This cyberattack has been named CoMB cyberattack i.e. a “compilation of many breaches” by the hacker as this is a hoard of critical private information that combines older data from data hacks in the past. These include credentials from LinkedIn, Netflix, Exploit, and others.

Under the username “Singularity0x01”, the hacker has set up a thread on the hacker forum called RaidForums and posted the  ‘Compilation of Many Breaches’ (CoMB) containing more than 3 billion individual combinations of cleartext email addresses and passwords.

Also read,

It has been observed that the exact location tracing of the cyberattack is quite complex. Up until now, we only know that the employed scripts and the tree-like appearance of CoMB share a rather uncanny similarity with the Breach Compilation, connoting that both attacks may have common origins.

Increasing need of Cybersecurity:

Notedly, 2020 has witnessed a substantial surge in the utilization of internet services. Especially in the business domains, cloud reliance has gained new momentum. The storage of important documents and personal data for some organizations rely completely on them. 

The CoMB cyberattack pretty much winds up such online storage to be self-contradictory, as cybercriminals can gain easy, unauthorized access to private data that can further be used for large-scale credential stuffing cyberattacks, data exploitation, as well as resource extortion.

In any case, despite the intents of whoever digs upon such offensive forums, it is the exposed user who stands to lose their cybersecurity and privacy against malicious threat actors.