What We Know So Far About the Supposed ‘Mother of All Data Breaches’


Data breaches It is so common These days, when a new one is announced, most web users can finally do more than anything like “yes, no shit” before sliding up to the next story. This week, it was claimed to be a violation thus The collector of the Internet is able to pass through the wall of cynicism.

Dubled “Mother of all data disruption“The violations are said to be involved in 16 billion users and have a large number of accounts on platforms such as Facebook, Google and apple. The crisis is first reported by cyber news, web security written by Deputy Site and researcher Vilus Petkauskas. The story broadcast on Wednesday claims that the violation expressed “one of the greatest violations of history.”

In the article of Petkauskas, “Billions of entrance credentials on corporate platforms on corporate platforms on social media and corporate platforms, with billions of entrance credentials) are described in 30 exposed information” EVERY MY WHO ” obtained from the base. Researchers said they were able to discover delicate databases due to unsuspecting security guards, although they said to be exposed to be very short to understand who were “control.”

“It’s not just a leak – a plan for mass exploitation,” he said, the applicants were reported met the site. “More than 16 billion entrance records, cybercriminals are now impossible access to personal credentials that can be used for account capture, identity theft and high-target phishing.”

The story of the Cyber ​​News was selected by a number of key places, including Forbes and AxIos. However, because security experts have started, launching the Internet of a news Call the article’s claims to question. According to critics, cyber news is not mistaken for the number of credentials exposed to and this is not enough news. However, some followers are not a new violation and a traditional sense, this is only one batch of old violations attached to each other and are placed online.

“To be clear, this is not a new information violation or generally violation and has not recently participated in these credentials” The law writes the computer.

Meanwhile, the information website that provides information about the harmful program samples found around the Internet, Tweeted about the story“Fear is characterized as a password leak, which is a perverted password, scaring the passwords, scaring and miscarriage.

Unfortunately, large violations are always formed and built around the shared of the stolen data in the world, the information of many of these violations is sold and re-sold on websites. Sometimes these data collector will compile a very large documentation of these violations, and where researchers will place a new thing here.

He said that the story of cyber news seems contrary to security researchers for some time. The “last” and “last” and “old violations are not recycled”. The story of the Cyber ​​News is also said: “On June 18, the results of unparalleled cybernews on the website and first published this story are constantly clarified in response to the mass discussion.” Gizmodo has reached cyber news for comment.

Breaking is interested in how dark Web Cretin’s instrument box, which is a harmful program known as “infostealer”. Infostealer – as sounded, after being infected with a device, it is a program that will command the login credentials stored in the computer’s browser. A very impressive tool, cybercriminals can use automated tools, can use it to quickly compile large lists of personal information that can be used for discount transactions on the road.

No matter whether it covers fresh leak credentials, it can be a good time to refresh your entries. The hackers are easier to work.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *