Dark web vendor SunTzu583 is back again with millions of decrypted Gmail and Yahoo accounts!

The dark web vendor SunTzu583, which made the news last week by selling more than a million of hacked Gmail, Yahoo, and PlayStation accounts along with their decrypted passwords, is now back at selling more than tens of millions of decrypted accounts.

According to the recent reports, SunTzu583 is offering more than 21 million compromised accounts, in a separate listing, for about $450.48, and the worst part is that more than 75 percent of the accounts contain decrypted passwords with them where else the remaining accounts have hashed passwords. It has been confirmed that these breached data was aggregated from past breaches of Nulled.cr, MPGH.net, and Dropbox.

A hefty total of 4,928,888 Gmail accounts, divided into three different listings, have been put on sale for about $300.49 by the dark vendor.

Also, SunTzu583 is selling over 5.7 million Yahoo users accounts for about $100.48. Interestingly, the vendors claim that they possess several unique accounts in order to gain the attention of potential buyers.

Tag : Gmail
FAQ
Q
How does Proofpoint work?
A
Email encryption is triggered when Proofpoint discovers certain keywords, phrases or expressions matching
those identified by the data leakage prevention rules. Upon discovery, the email is automatically encrypted
before it is sent. The addressee will receive a message directing them to our Proofpoint site where they can
retrieve the decryption key. This will allow them to read the message
Q
Do I need to do anything to cause Email to be encrypted?
A
Yes – you should still utilize #secure in the subject line to encrypt messages with sensitive information. Should
you forget to utilize #secure, Proofpoint will serve as a back up. Proofpoint will detect the presence of sensitive
information; the email will automatically be encrypted before the message is transmitted out to the Internet.
The encryption enforcement is based on our corporate email security encryption and compliance policies.
Q
Why is outbound email being encrypted?
A
Federal and State law requires personally identifiable patient and financial data be secured when in transit over
the Internet. By default, email you send to an Internet‐based address is not encrypted. It is sent in clear text
and can be viewed or altered by someone other than the addressee.
Q
What is not end-to-end email encryption?
A
For a better understanding of what end-to-end email encryption is, we must first understand what is not end-to-end encryption.

SSL/TLS — When you visit https://www.gmail.com, the HTTPS in front of the URL denotes that SSL/TLS protocol has been used to encrypt the data transferred between your computer and the Gmail servers. This protocol is much more secure than HTTP (without “S” = not secure). Most websites adopted SSL/TLS to protect against malicious intermediaries. The downside to relying solely on HTTPS, is that data is only encrypted between your device and the Gmail servers. Gmail has the keys to decrypt that data.
Q
What is end-to-end email encryption?
A
End-to-end email encryption is a method of transmitting data where only the sender and receiver can read email messages. With end-to-end email encryption, the data is encrypted on the sender’s system. Only the intended recipient will be able to decrypt and read it. Nobody in between can read the message or tamper with it. End-to-end email encryption provides the highest level of confidentiality and protection to your email communication.