Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

After a Hacker Stole 1.17 Billion Credentials, What He Did Next Will Leave You Dumbfounded

After a Hacker Stole 1.17 Billion Credentials, What He Did Next Will Leave You Dumbfounded

Unfortunately, stories of major data breaches are the norm in today’s news cycle. However, what often gets left out of the story is how the hacker profits from the stolen data. In the case of a recent major hack in Russia of more than one billion credentials, what the hacker did with all of this data has us scratching our heads.

The bizarre case is reported by Alex Holden of Hold Security, who was alerted to the hack by reading about it on an online forum--posted by the hacker himself! Right away, this move comes off as odd, seeing as most hackers try their darndest to keep their handiwork under wraps for as long as possible. After all, the longer a data breach goes undetected, the more valuable the stolen data will be on the black market.

What’s more, the sheer size of this hack is mind boggling, with more than a billion credentials stolen from the Russian service Mail.ru, along with additional account information from Google, Yahoo, Microsoft, and other major email providers from countries such as China and Germany. In total, 1.17 billion records from these services were lifted, which included username and password combinations from U.S.-based accounts connected with major banks, retailers, and manufacturers.

For a haul this large, the hacker could have had himself a major payday. Yet, his asking price for the cache was a mere 50 rubles (less than one American dollar).

Holden responded by haggling for possession of the stolen data, refusing to pay any money. Instead, he was able to convince the hacker to turn over all of the stolen credentials in exchange for a few “likes” on a social media page.

However, just because the credentials have been turned over to Hold Security, doesn’t mean that the hacker hadn’t previously turned them over to other parties with nefarious purposes in mind. Further data breaches could result from this one major breach, and additional hackers can use information from the stolen credentials to engineer new ways of accessing new accounts. Reasons like this are why you should always be vigilant when it comes to protecting your online identity.

To protect your own online accounts from hackers, be sure to follow best security practices like regularly changing your passwords and using complex characters for your passwords. These simple measures will go a long way toward keeping your account safe, should your credentials ever be compromised. However, there are plenty of additional security measures that you should take, along with enterprise-level security solutions that you’ll want to implement, especially when dealing with the network security of your organization.

To learn more about how Evolve IT can protect you from the wily ways of hackers, give us a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 18 April 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Efficiency Workplace Tips Google Computer Hosted Solutions Microsoft Upgrade IT Support Mobile Devices Innovation Smartphone Windows 10 Hardware Network Security Ransomware Gmail Microsoft Office Office Backup Operating System Apps Business Continuity Disaster Recovery Communication The Internet of Things Social Media Hacking WiFi Bandwidth Facebook Managed Service Provider Outlook Firewall Content Filtering Wireless Technology Android Cybercrime Website Apple Best Practice Alert Employer-Employee Relationship Networking History Two-factor Authentication Data storage Data Windows Small Business Experience Phishing App Mobile Computing Big Data communications Safety Mobile Device Management Unified Threat Management Money Network Smartphones Quick Tips Society Government Sports Augmented Reality Google Wallet Keyboard Spam Retail Running Cable Search User Information Technology Hard Drives Windows 8 Internet of Things Remote Computing Hosted Solution Shortcut Windows XP IT Services Managed IT services Documents DDoS Artificial Intelligence Heating/Cooling Tech Support Word Compliance Drones Bluetooth Social Printer Business Management Browser Automation Virtual Desktop Wireless Memory Securty Competition Unified Communications Presentation Document Management Entrepreneur Encryption Deep Learning Domains Law Enforcement SaaS VoIP BDR Hacker Proactive IT Cortana Vendor Management Network Congestion Application Save Money Customer Service Music Monitors Cryptocurrency Laptop Router IBM Displays Office 365 Google Docs Education Cleaning Holiday Analytics Black Market YouTube Saving Money Processors End of Support intranet Staffing Lithium-ion battery Office Tips LiFi BYOD Downtime Passwords Streaming Media Help Desk Writing Social Networking Disaster Micrsooft Visible Light Communication Public Speaking IP Address Business Growth Virtualization Data Management Recovery Robot Advertising
QR-Code