{"id":194,"date":"2025-12-19T09:15:55","date_gmt":"2025-12-19T09:15:55","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/"},"modified":"2025-12-19T09:15:55","modified_gmt":"2025-12-19T09:15:55","slug":"processing-630-million-more-pwned-passwords-courtesy-of-the-fbi","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/","title":{"rendered":"Processing 630 Million More Pwned Passwords, Courtesy of the FBI"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.troyhunt.com\/content\/images\/2025\/12\/a08fc320-8a40-4fc6-a82e-48a6f12f51ae.png\" alt=\"Processing 630 Million More Pwned Passwords, Courtesy of the FBI\"><\/p>\n<p>The sheer scope of cybercrime can be hard to fathom, even when you live and breathe it every day. It&#8217;s not just the volume of data, but also the extent to which it replicates across criminal actors seeking to abuse it for their own gain, and to our detriment.<\/p>\n<p>We were reminded of this recently when the FBI reached out and asked if they could send us 630 million more passwords. For the last four years, <a href=\"https:\/\/www.troyhunt.com\/open-source-pwned-passwords-with-fbi-feed-and-225m-new-nca-passwords-is-now-live\/\" rel=\"noreferrer\">they&#8217;ve been sending over passwords found during the course of their investigations<\/a> in the hope that we can help organisations block them from future use. Back then, we were supporting 1.26 <em>billion<\/em> searches of the service each month. Now, it&#8217;s&#8230; more:<\/p>\n<p><!--kg-card-begin: html--><\/p>\n<div class=\"twitter-tweet twitter-tweet-rendered\" style=\"display: flex; max-width: 550px; width: 100%; margin-top: 10px; margin-bottom: 10px;\"><iframe id=\"twitter-widget-0\" scrolling=\"no\" frameborder=\"0\" allowtransparency=\"true\" allowfullscreen=\"true\" class title=\"X Post\" src=\"https:\/\/platform.twitter.com\/embed\/Tweet.html?creatorScreenName=troyhunt&amp;dnt=false&amp;embedId=twitter-widget-0&amp;features=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%3D%3D&amp;frame=false&amp;hideCard=false&amp;hideThread=true&amp;id=1979312335056720026&amp;lang=en&amp;origin=https%3A%2F%2Fwww.troyhunt.com%2Finside-the-synthient-threat-data%2F&amp;sessionId=25d6d0c9017915ef93552d11571899883e2c74ca&amp;siteScreenName=troyhunt&amp;theme=light&amp;widgetsVersion=2615f7e52b7e0%3A1702314776716&amp;width=550px\" style=\"position: static; visibility: visible; width: 550px; height: 649px; display: block; flex-grow: 1;\" data-tweet-id=\"1979312335056720026\"><\/iframe><\/div>\n<p><!--kg-card-end: html--><\/p>\n<p>Just as it&#8217;s hard to wrap your head around the scale of cybercrime, I find it hard to grasp that number fully. On <em>average<\/em>, that service is hit nearly 7 thousand times per second, and at peak, it&#8217;s many times more than that. Every one of those requests is a chance to stop an account takeover. But the real scale goes well beyond the API itself. Because the data model is open source and freely available, many organisations use the <a href=\"https:\/\/github.com\/HaveIBeenPwned\/PwnedPasswordsDownloader?ref=troyhunt.com\" rel=\"noreferrer\">Pwned Passwords Downloader<\/a> to take the entire corpus offline and query it directly within their own applications. That tool alone calls the API around a million times during download, but the resulting data is then queried\u2026 well, who knows how many times after that. Pretty cool, right?<\/p>\n<p>This latest corpus of data came to us as a result of the FBI seizing multiple devices belonging to a suspect. The data appeared to have originated from both the open web and Tor-based marketplaces, Telegram channels and infostealer malware families. We hadn&#8217;t seen about 7.4% of them in HIBP before, which might sound small, but that&#8217;s 46 million vulnerable passwords we weren&#8217;t giving people using the service the opportunity to block. So, we&#8217;ve added those and bumped the prevalence count on the other 584 million we already had.<\/p>\n<p>We&#8217;re thrilled to be able to provide this service to the community for free and want to also quickly thank Cloudflare for their support in providing us with the infrastructure to make this possible. Thanks to their edge caching tech, all those passwords are queryable from a location just a handful of milliseconds away from wherever you are on the globe.<\/p>\n<p>If you&#8217;re hitting the API, then all the data is already searchable for you. If you&#8217;re downloading it all offline, go and grab the latest data now. Either way, go forth and put it to good use and help make a cybercriminal&#8217;s day just that much harder \ud83d\ude0a<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The sheer scope of cybercrime can be hard to fathom, even when you live and breathe it every day. It&#8217;s not just the volume of data, but also the extent to which it replicates across criminal actors seeking to abuse it for their own gain, and to our detriment. We were reminded of this recently [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[90,267],"tags":[91],"class_list":["post-194","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-have-i-been-pwned","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Processing 630 Million More Pwned Passwords, Courtesy of the FBI - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Processing 630 Million More Pwned Passwords, Courtesy of the FBI - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"The sheer scope of cybercrime can be hard to fathom, even when you live and breathe it every day. It&#8217;s not just the volume of data, but also the extent to which it replicates across criminal actors seeking to abuse it for their own gain, and to our detriment. We were reminded of this recently [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-19T09:15:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.troyhunt.com\/content\/images\/2025\/12\/a08fc320-8a40-4fc6-a82e-48a6f12f51ae.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"Processing 630 Million More Pwned Passwords, Courtesy of the FBI\",\"datePublished\":\"2025-12-19T09:15:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/\"},\"wordCount\":457,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.troyhunt.com\/content\/images\/2025\/12\/a08fc320-8a40-4fc6-a82e-48a6f12f51ae.png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\",\"Have I Been Pwned\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/\",\"name\":\"Processing 630 Million More Pwned Passwords, Courtesy of the FBI - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.troyhunt.com\/content\/images\/2025\/12\/a08fc320-8a40-4fc6-a82e-48a6f12f51ae.png\",\"datePublished\":\"2025-12-19T09:15:55+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/#primaryimage\",\"url\":\"https:\/\/www.troyhunt.com\/content\/images\/2025\/12\/a08fc320-8a40-4fc6-a82e-48a6f12f51ae.png\",\"contentUrl\":\"https:\/\/www.troyhunt.com\/content\/images\/2025\/12\/a08fc320-8a40-4fc6-a82e-48a6f12f51ae.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Processing 630 Million More Pwned Passwords, Courtesy of the FBI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Processing 630 Million More Pwned Passwords, Courtesy of the FBI - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/","og_locale":"en_US","og_type":"article","og_title":"Processing 630 Million More Pwned Passwords, Courtesy of the FBI - Imperative Business Ventures Limited","og_description":"The sheer scope of cybercrime can be hard to fathom, even when you live and breathe it every day. It&#8217;s not just the volume of data, but also the extent to which it replicates across criminal actors seeking to abuse it for their own gain, and to our detriment. We were reminded of this recently [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2025-12-19T09:15:55+00:00","og_image":[{"url":"https:\/\/www.troyhunt.com\/content\/images\/2025\/12\/a08fc320-8a40-4fc6-a82e-48a6f12f51ae.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"Processing 630 Million More Pwned Passwords, Courtesy of the FBI","datePublished":"2025-12-19T09:15:55+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/"},"wordCount":457,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.troyhunt.com\/content\/images\/2025\/12\/a08fc320-8a40-4fc6-a82e-48a6f12f51ae.png","keywords":["Cybersecurity"],"articleSection":["Cybersecurity","Have I Been Pwned"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/","url":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/","name":"Processing 630 Million More Pwned Passwords, Courtesy of the FBI - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.troyhunt.com\/content\/images\/2025\/12\/a08fc320-8a40-4fc6-a82e-48a6f12f51ae.png","datePublished":"2025-12-19T09:15:55+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/#primaryimage","url":"https:\/\/www.troyhunt.com\/content\/images\/2025\/12\/a08fc320-8a40-4fc6-a82e-48a6f12f51ae.png","contentUrl":"https:\/\/www.troyhunt.com\/content\/images\/2025\/12\/a08fc320-8a40-4fc6-a82e-48a6f12f51ae.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/processing-630-million-more-pwned-passwords-courtesy-of-the-fbi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"Processing 630 Million More Pwned Passwords, Courtesy of the FBI"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=194"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/194\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=194"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}