Data from ShareThis.com Breach Appeared on Dark Web

  • By David Lukic
  • Feb 05, 2021

 ShareThis is a technology company that makes plugins and apps to share web content on social media. Earlier this year, The Register published an article claiming that 16 companies had been hacked, and databases with more than 620 million accounts were being sold on the dark web. ShareThis was listed as one of the companies. The ShareThis.com breach affected 41 million users, and hackers got away with names, email addresses, some dates of birth, and hashed passwords. The cybercriminal boasted of his treasure trove on the dark web and offered the entire package of all 41 companies’ data for less than $20,000 in bitcoin. The story in the Register stated that the passwords could be decrypted and then the usernames/password combos used on other sites for the same users. Potentially, the ShareThis breach could have far-reaching consequences.

sharethis breach

When Was the ShareThis.com Breach?

News of the ShareThis breach surfaced in February of 2019, but the hacker implied that the database pilfering took place during 2018. ShareThis has done their own investigative research and thinks that the actual data breach occurred in July of 2018.

Cybersecurity forensic experts are scouring ShareThis’ systems for how the breach occurred, but they have come up empty-handed. So now they are trying to find ways to secure their networks better. However, if they are unaware of how it occurred in the first place, it might be difficult to trust them to keep things safe in the future.

How to Check if Your Data Was Exposed in ShareThis Breach

ShareThis deactivated every account that was breached by this incident. So, if you have a ShareThis account, you will no longer be able to log in until you change the password. Additionally, they set up this informational page to help victims with more information and a contact email address if you have further questions inquiries@sharethis.com.

What to Do if Your Victim of ShareThis Data Breach

If your account was included in the ShareThis data breach, you would first want to make sure your account password has been reset. A lot of people use the same passwords on different websites. If you do, change those passwords as well and use a complex combination of letters, symbols, and numbers. You should also take the following precautions:

  • Change your passwords for logins associated with banks and credit cards.
  • Sign up for credit monitoring with a good company.
  • Run a full scan of your computer to be sure you were not scammed or infected with a virus or malware.

Can My ShareThis Data Breach Information be Used to Steal my Identity?

The data stolen from ShareThis can absolutely be used to steal your identity. Since piles of information are showing up on the dark web daily, this new data paired with other batches can piece together your entire life. All that data in the hands of cybercriminals equals disaster. Not only can they steal your identity, many of them use the information to trick you with scam or phishing emails, so you will click a link (which looks legitimate), but now your computer is infected with a virus or ransomware. Sometimes these hackers take you to websites that look just like the real thing and ask you to log in or verify details, and instead of accessing your account, you have handed over more information to criminals. You cannot be too careful these days.

sharethis data breach

What to Do to Protect Yourself Against Cybercriminals

Although we cannot control how companies use and protect our information, we can take steps to protect ourselves and keep our identities safe.

  • Never give out more information than you need to, especially online.
  • Do not use the same passwords on multiple sites (no matter how tempting it might be). Always use long, complex passwords and store them in a password vault, so you only have to remember a single password.
  • Carefully monitor your bank and credit card statements each month to look for suspicious charges.
  • Keep all your devices updated with the latest operating system patches and antivirus software; run scans often.
  • NEVER click links in an email or download attachments.
About the Author
IDStrong Logo

Related Articles

What is Data Leak and How to Prevent Accidental Data Leakage

Data breaches take many forms, and one of them is through data leak and accidental web exposure. M ... Read More

The Saga of T-Mobile Data Breach: 2013, 2015, 2021 and 2023 Hacks

T-Mobile has experienced a number of data breaches in the past decade. The first case occurred som ... Read More

Anthem Data Breach Exposed 78 Million Records

In the Anthem Data Breach of 2015, hackers were able to steal 78.8 million member’s records. ... Read More

Everything You Need to Know About Insider Data Breach

Data breaches are on the news frequently, but the average person doesn’t really know that mu ... Read More

The NSA Hack, How Did it Happen?

The National Security Agency (NSA) was the main attraction in a major data breach involving three ... Read More

Latest Articles

What is an Incident Response?

What is an Incident Response?

What is an Incident Response? After a bank heist, the work begins with specialized teams and plans engaged, allowing for analysis of the event, and from this analysis, the bank can prepare a response to the incident.

What is a Social Engineering Attack? Techniques and Ways to Prevent

What is a Social Engineering Attack? Techniques and Ways to Prevent

Everyone has received a spam text or email at some point. Their hallmarks are widely known; they often include poor or strange grammar, suspicious links, suggested connections with companies or people, or random individuals asking for help in some capacity.

Side Channel Attack: Everything You Need To Know

Side Channel Attack: Everything You Need To Know

Every year, millions of people get victimized by data breaches. Criminals steal their data from the network environments of organizations, vendors, providers, institutions, and governments; with ever-increasing frequency, cybercriminals are making big moves in the cyber wars—and making billions of dollars. 

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close