Service receive & sending SMS

What do hackers do with stolen passwords?

1572   |     /   Security

What do hackers do with stolen passwords?
Hackers are constantly searching the Internet for a victim. One of their favorite attacks is a vulnerable database server. This is due to the fact that these types of servers store all kinds of data that may come in handy in future attacks. They look for personal information such as names, addresses ... and passwords.

If the site after registration asks for confirmation of the SIM card, use our online service

In recent years, hackers have cracked some fairly massive databases. Sometimes they run away with millions of records at a time. So what does a hacker do with millions of user passwords? The latest Shape Security report talks about a cyber attack known as credential filling.

In an attack using credentials, the hacker loads the database with as many passwords and usernames as he has. These credentials are entered into an automated hacker tool that clogs them to a website. You can think of a hacker password database as a keychain. The more keys, the more likely the attacker will find the one that unlocks your account.

These attacks are much more common than you think. According to Shape Security, about 90% of all login attempts on sites are not users who log into the system with their own accounts. They are the result of an attack.

Many kinds of sites are on the gun. Airline sites take second place, where accounts account for about 60% of logins. Immediately after the airlines online banking sites 58%. Also, hotel sites 44%.

It is easy enough to understand why they are preferred goals. Attackers hope to hack an account in order to gain access to payment card data or make fraudulent purchases.

Shape Security claims that credential attacks can be effective even in 3% of cases. It may not seem like so many successful entries, but it is 30,000 wins for every million attempts. The results of the report emphasize why you need to choose complex passwords, and why you should never reuse a password on multiple sites.

Similar news

Hackers send malware by regular mail

Sounds crazy right? Computer games veteran Brian Krebs claims that this happens quite often. Suspicious envelopes can be marked with mail from any country; these letters are often found in the mailboxes of state and local authorities.

The basis of the Internet is aging every day for 30 years

The Internet has changed the conduct of business. This is what is pretty clear these days. Now it’s as easy for businesses to find customers across the road as they are across the Pacific. Employees no longer need to be tied to their desktops, but can access and complete their work from anywhere in the world. Finally, companies have the opportunity to communicate with millions of customers at t...

Android Q have face recognition like Apple

It was reported that Google is developing built-in support for secure biometric authentication features similar to the Apple Face ID in the upcoming release of the Android Q operating system for smartphones. Writing on the XDA-Developers Portal, Mishal Rahman points out “dozens of lines and a lot of methods, classes and fields related to face recognition, SystemUI and APK settings” of the relea...


This is not only a service for receiving and sending SMS messages to virtual numbers, but also a tutorial on user safety in the modern world, the latest developments in IT, social media security, fresh programs and lessons that simplify our lives. So are other issues encountered by the average user. In simple words, each user will find for themselves something interesting or answers to their questions.

SIMonline © 2018 - 2024

All rights reserved