We've seen a resurgence of older breach datasets being resurfaced and re-monetized across various dark web communities, often targeting individuals who may have reused credentials across multiple platforms. What really caught our attention with the recent reappearance of the LizardSquad data wasn't the novelty of the breach itself, but the still-viable attack surface it represents nearly a decade later. The plain text passwords and the relatively unsophisticated nature of the target make this a potent reminder of the long tail of legacy security failures.
The LizardSquad breach, dating back to January 2015, involved the compromise of the LizardStresser DDoS service. This service, ironically, was created by the LizardSquad hacking collective to facilitate distributed denial-of-service attacks against online targets. The breach exposed the service's user database, revealing the accounts of individuals who had subscribed to the DDoS-for-hire platform. The incident is a stark reminder of the risks associated with even seemingly low-profile online services and the potential for compromised credentials to persist as a threat for years.
The breach was initially discovered following its public disclosure by various security researchers and threat intelligence feeds. Its significance lies in the fact that the exposed passwords were stored in plain text, a major security lapse that allowed attackers to easily compromise user accounts. The reappearance of this data underscores the importance of robust password management practices and the need for organizations to proactively monitor for compromised credentials associated with their users.
The continued relevance of this breach to enterprises stems from the likelihood that some individuals used the same email addresses and passwords for both personal and professional accounts. This overlap creates a vulnerability that attackers can exploit to gain unauthorized access to corporate systems and data. The availability of these credentials in the cybercrime ecosystem makes it imperative for organizations to implement multi-factor authentication and continuously monitor for signs of credential stuffing attacks.
Key point: Total records exposed: 11,297
Key point: Types of data included: Email Addresses, Passwords (plain text)
Key point: Sensitive content types: User credentials
Key point: Source structure: Database
Key point: Leak location(s): Various hacking forums and online repositories.
News outlets covered the initial LizardSquad activities extensively. For example, in 2014, KrebsOnSecurity reported on LizardSquad's DDoS attacks targeting online gaming services, highlighting the group's notoriety and disruptive capabilities ( KrebsOnSecurity ). The LizardStresser breach was a consequence of their activities, showcasing the group's own operational security failures.
Discussions on hacking forums often reference the LizardSquad breach as a historical example of poor security practices. One forum post noted that "the fact that they stored passwords in plain text is just unbelievable, even for 2015."
Email · Address · Passwords
See if your personal information has been exposed in data breaches
Scan to sign up instantly
We found your data exposed in multiple breaches. This includes:
Your information is protected by enterprise-grade security