Department of Justice: Computer Crime & Intellectual Property Section [4, 6] NIST: Guide to Malware Incident Prevention [5] FTC: How to Recover After a Data Breach [10]

Use the built-in security features in your browser to identify saved passwords that have been exposed [3]. 3. Immediate Defense Steps

Instead of downloading raw lists, use secure, legitimate databases to see if your own credentials have been compromised: