Over 33 Million QIP.ru Accounts Hacked
Second large Russian data breach released this week compromising millions across the world.
Today, HEROIC obtained and validated a data breach of over 33 million accounts associated with Russian instant messaging platform QIP.ru.
The database was provided to us by a hacker going by the name daykalif. The database contains user email addresses, usernames, passwords and other related fields dating from 2009-2011. The passwords within the database were stored in plaintext with no encryption or hashing.
The breach in total contains 33,394,101 accounts and has been verified with successful password reset attempts.
QIP is a free internet communication platform much like ICQ. The downloadable program provides websites and users the ability to send instant messages as well as video and audio calls.
We encourage everyone to search our database of over 2.1 billion hacked records including QIP.ru for free by visiting our homepage or scanning down below. If your account has been compromised in any of our hacked databases, HEROIC will provide measures to remediate and secure your affected account(s) moving forward.
Has Your Email Account Been Hacked?
See if your email has been compromised with the most powerful scan engine.
Below are the top 10 passwords used within the accounts hacked and their frequency:
- “123456” – 607,156
- “123123” – 148,642
- “111111” – 147,106
- “123456789” – 118,804
- “12345678” – 98,830
- “qwerty” – 74,499
- “1234567” – 73,053
- “666666” – 65,124
- “0” – 64,887
- “123321” – 60,133
HEROIC is the provider of hacker and threat protection cybersecurity for home users and their devices. With a hacked database containing over 2.1 billion account records and over 1,400 individual hacks from across the world, HEROIC allows users to see if their accounts have been compromised for free. Additionally, HEROIC provides users with a cybersecurity platform that predicts and prevents cyber attacks before they happen. To learn more, and for a free account, please visit HEROIC.com.