Hackers after your personal data, for profit
Ethamphoto / Alamy
Make sure you use a great mix of characters. Avoid your pet’s name. Most of all, don’t change a password. We all know the rules of making sure that the keys of our digital kingdoms will remain safe, and we may all turn off money to sell your data.
Markets for stolen personal data to improve on dark web, sites that are at the forefront of regular internet boundaries and can only be accessed by software as Tororiginally designed by intelligence intelligence agencies for concealing communications. Not everybody with bad – BBC news runs on a dark web site for people living under oppressive watch, but it’s so much.
To find out more, I’m back Rory HattthAn ethical hacker of a company called Evalian, spent his time breaking companies – legally – to test security. He told me to have a “little bit” without any of my private data has been leaked by hackers. I have written about the technology just enough to determine what the data violations are, but faced with swift reality that it is a small call.
Hattingh started by showing me a website called I happen to be pwndd (A slang term meaning that your data has been compromised), which focuses on usernames and passwords shared with the Dark Web in a searchable database. I entered my email address and, anxious, found it seized at 29 attack attacks.
The most recently occurred in 2024, when attacking the internet archive and my email and password has been leaked. My details are also part of 122 gigabytes in the User data scraped from thousands of telegram channels, as well as a database called Naz. Other attacks listed involve stolen postal talks, job titles, telephone numbers, identification dates from Adobe, Dropbox and LinkoBob.
In theory, these drops have limited amounts: If LinkedIn, say, hacked and your username and password does not affect your Facebook account. That unless, of course, a more than 60 percent of people using same password always and repeatedly. In that case, hackers can get these details and jumps on the internet, using it wherever they can think – usually in an automatic way of lightning, automatically. Then Hattingh said, “You have a lot of trouble”.
It may include online shopping with your stored payment details, PayPal accounts or cryptocurrency wallets. Access to an account also helps to enter others, with an email that is jackpot. If you can send and receive emails from an account, you can reset the passwords and finish all websites, not discussing household billing accounts and maybe even online banking. Hackers with social media or email accounts can also try to deceive friends and family with fake emergency tales that require an easy bank transfer. The fact that it comes from a real account gives these tricks a wind of the possibility to be enough to overcome suspicion until it is.
To make things worse, even if some companies suffer hacks can easily let people know and encourage them to change their passwords, others will be more lazy in months or even years. Hattingh said that in a previous job, for anonymous clients, he could see ransomware attacks arriving and turned into a bit. These attacks have seen the victim data encrypted and held in ransom, unprofitable unless you pay hacker for password – but increasingly, some companies see it as business costs.
“These companies will hack two, three times a year,” said Hattingh. “They have a slush fund for when things go wrong. They pay and go on life. And this is happening around the world, all the time.”
As part of seeing my personal data is in the open like this, the records of my specified Mechanical Paris you can find in the chicken you can find chicken nuggets. Hattingh said the premium steak of personal data comes when sophisticated hackers first break a website and stole a new haul to sell to others, which is worthwhile to enjoy it. Once earlier buyers get what they can, the data will be sold again. Once the most profitable bits of data have been picked out, the rest may end up being released for free on a hackers’ forum, telegram channel or some other dark corner of the web, where have I been pwned also picks it up.
Working in the food chain, hating hatting me a fee – for the service called Dehas, but also their true works, but also their real content, including passwords. Service name refers to the common process of “washing” security, or withdrawing a password to stop it copied. Of course, it is dismissed. My guess is the worst case, but I know now that behavior, become true: at least one of the passwords familiar with my email address both familiar and now. In theory, nothing to stop hackers – or anyone with a passing interest – log in to at least one of my online accounts.
The flow is a paid service, worth $ 219.99 a year, explaining for “law enforcement agencies and fortune to 500 companies”. I contacted the company to ask if they are concerned that their tool, acknowledged that only the details leaking elsewhere, can be used for hackers as well as security workers. I have not received an answer.
I decided I need to deepen the dark web. I was talking Anish Chanuhan In equilibrium security services, which show me the consequences of a search made of bespoke software, which is greater than more commercial utensils i have seen so far. He finds 24 passwords linked to my online account.
“Users can say, ‘I get a 200-character password, no one always compelled to force’,” says Chaulan. “But said they used that on every single website they used. This kind it makes it unrelated, because it’s just people, we just know the road sooner, we know it’s just as soon as we know it is,
Chauhan said the solution was pretty simple and that we all heard this before: Use different passwords for each account. Seeing how my details are widely shared, it’s more clearly why it’s important.
The item is, the tools to make it easy there – most modern devices and Internet brows should have a random password manager who reminds them all for you. If you are worried that your passwords are leaked, it may be worth checking me to be taking or pay for larger internet services for evidence of a leak.
In recent years, I have used a password manager to create strong passwords and organizes it for me, but I know that some services I have used for long and hacked logins. I give a night correcting that, not more because I want to prepare before this article is published.
But I didn’t beat myself. Faced with endless demands with new login details, not surprisingly sometimes we can get a quick way. I’m never alone doing so.
“I’m a beautiful tech savvy person, and I can hardly change my passwords,” said Hattingh. “For work, I change it, but in my personal life, I’m a little lazy.”
Topics: