Friday, January 22, 00:26
Home security Researcher reports that stolen credentials are distributed for free on the dark web

Researcher reports that stolen credentials are distributed for free on the dark web

If you're reading this article, it's time to change all your passwords.

This is because there is a good chance that your login information - or at least an earlier version - is circulating on secret networks (the dark web) where hackers are trading stolen passwords.

These secret networks are constantly growing, according to Alex Heid, lead researcher and developer SecurityScorecard, a security company at cyberspace.

Dark web

"Within the underground hacking community, credentials are bought, sold and distributed for free like Pokémon cards," Heid told Business Insider. "There are dozens of different hacking forums that contain terabytes of information at least 10 years old."

These forums work primarily on the dark web, a network of encrypted sites that do not appear on algorithms search. The login credentials and passwords that end up in these dark web forums usually come from huge breaches data, which happened frequently throughout the previous year.

Hackers are using increasingly sophisticated database software to compile "combo lists" of millions of connection credentials, according to Heid.

Even if hackers only have one set of credentials - for example, DoorDash users - they can easily invade the user's accounts on other sites. Hackers use "checkers" or programs that can obtain an email address user and quickly determine if it is used by others websites. From there, hackers usually try to link to these other sites using the same password, betting that objectives they use the same password on all platforms. In many cases, they are successful.

With the hacking to become ever more profitable and hacker software to become more sophisticated, there is no indication that this trend will slow down soon. In the meantime, Heid advises users to change their passwords and ensure that passwords are different on services that they use.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehchttps://www.secnews.gr
Be the limited edition.

LIVE NEWS

Mac: How to see which model you have and when it was released

When you need support for your Mac - or want to install some kind of upgrade - you usually need to know the exact ...
00:02:35

Bill Gates: Will he work with Biden on COVID-19 / climate change?

Microsoft co-founder Bill Gates said on Twitter that he is looking forward to working with the new US President, Joe Biden, and ...

What are the rumors circulating about the iPhone 13?

Apple iPhone 13 will have a redesigned Face ID system that will have a smaller notch at the top of the screen, ...

Biden: How was the political transition in the US captured on social media?

As Joe Biden was sworn in as President of the United States, this important political transition was captured on popular social media. On January 20, ...

CentOS ceases to be supported but RHEL is offered for free

Last month, Red Hat caused a great deal of concern in the Linux world when it announced the discontinuation of CentOS Linux.

Microsoft Office 365 employee passwords leaked online!

A new large-scale phishing campaign targeting global organizations has been found to bypass Microsoft Office 365 Advanced Threat Protection (ATP) and ...

COSMOTE and Microsoft provide new cloud solutions for businesses

COSMOTE and Microsoft expand their cooperation, offering even more advanced and high quality cloud solutions, in large and small ...

Cyber ​​attacks in Eastern Europe are on the rise!

The cyber-attacks that have taken place in many US government agencies and companies in recent months have caused concern in the developing countries of ...

Tesla reduces the prices of the Model 3 in Europe

Tesla has reduced the prices of the Model 3 in many European markets, which reductions could be partly linked ...

iOS, Android, XBox users in the crosshairs of a new malvertising campaign

Recently a new malvertising campaign was discovered that targets users of mobile and other connected devices and uses effective ...