Saturday, July 4, 04:20
Home security Researcher reports that stolen credentials are distributed for free on the dark web

Researcher reports that stolen credentials are distributed for free on the dark web

If you're reading this article, it's time to change all your passwords.

This is because there is a good chance that your login information - or at least a previous version of it - is circulating on the secret networks (on the dark web) where hackers trade in stolen passwords.

These secret networks are constantly growing, according to Alex Heid, lead researcher and developer SecurityScorecard, a security company at cyberspace.

Dark web

"In the underground hacking community, credentials are bought, sold and traded for free like Pokémon cards," Heid told Business Insider. "There are dozens of different hacking forums that contain terabytes of information at least 10 years back."

These forums work primarily on the dark web, a network of encrypted sites that do not appear on algorithms search. The login credentials and passwords that end up in these dark web forums usually come from huge breaches data, which often happened throughout the previous year.

Hackers are using increasingly sophisticated database software to compile "combinations of lists" of millions of login credentials, according to Heid.

Even if hackers only have one set of credentials - for example, DoorDash users - they can easily access user accounts on other sites. Hackers use “checkers” or programs that can get one's email address user and quickly determine if it is used by others websites. From there, hackers usually try to link to these other sites using the same password, betting that objectives they use the same password on all platforms. In many cases, they are successful.

With the hacking to become ever more profitable and hacker software to become more sophisticated, there is no indication that this trend will slow down soon. In the meantime, Heid advises users to change their passwords and ensure that passwords are different on services that they use.


Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehc
Be the limited edition.


Avaddon ransomware: Attacks through Excel 4.0 macros

Microsoft announced yesterday that Avaddon ransomware spread this week through an old technique that came to the fore again. The...

Apple: Prohibits updating Chinese Apps without permission

Apple is banning developers from updating existing apps in China's App Store if they don't have government approval.

Australia: Thousands of MyGov accounts are sold on the Dark Web

Access to more than 3600 MyGov accounts is being sold on the dark web, potentially exposing thousands of Australians to fraud and identity theft.

Party Time: Watch TV with your friends online

Party Time: Watch TV with your friends on the internet Time for a different party than you are used to, watching your favorite ...

CISA and FBI warn businesses of Tor's risks

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a warning to businesses regarding ...

openSUSE: The new Leap 15.2 hard drive has been released

Recently, the next stable version of the openSUSE operating system was released. According to the development team of the operating system, ...

What are the most popular types of malware?

Researchers are looking for the most common types of malware. During the investigation of the malicious activities, the researchers in cyberspace focus ...

REvil ransomware: Target the Light SA electricity company

The operators of REvil ransomware (also known as Sodinokibi) violated the Brazilian electricity company Light SA ...

LinkedIn: Our bug is due to an iOS problem

A representative of LinkedIn told ZDNet yesterday that an error in the iOS application was responsible for a seemingly "interfering behavior" that ...

Valak Info Stealer targets businesses in Europe and America

Many businesses in North and South America, but also in Europe, have fallen victim to the infamous Valak Info Stealer.