More than 100,000 hackers have had their credentials stolen… on cybercriminal forums!


After analyzing dozens of hacker sites, cybersecurity researchers at Rock Hudson discovered that at least 100,000 user accounts fell victim to data-stealing malware.

Credit: 123rf

Hudson Rock’s IT security experts explain their approach: “Our cybercrime database includes more than 14,500,000 computers infected by info-stealers. We analyzed 100 of the top cybercrime forums, and here’s what we found: over 100,000 hacking forums user accounts were exposed by malware.

To read – Researchers Have Discovered Cybercriminals’ New Supermarket on the Dark Web

By cross-checking the information available to them and data from various “leaks”, the company found that 100,000 computers analyzed belonged to hackers, and that they contained credentials for logging into the Dark Web. The information is astonishing, as the hackers are supposed to be familiar with the workings and the threat posed by info-stealers, these malicious software which seek login information in the computer of their target, and more particularly in the word managers browser passwords.

Thousands of hackers have their credentials stolen by malware

According to a Hudson Rock representative, hackers infect computers by promoting fake software or creating YouTube tutorials that direct victims to infected software download sites. Other hackers, beginners or just less competent, fall into the trap and get infected. Afterwards, finding the true identity of budding pirates is very easy for cybercriminals.

The info-stealers’ logbook reveals almost everything users. Information as personal as names, addresses and telephone numbers are revealed in the browser’s auto-fill form data, or even the name of the system, its IP address, other email addresses and other user names. . According to the researchers, hacker forums most exposed to info-stealers are, in order, Nulled.to, Cracked.io, and Hackforums.net. Between them, these three sites bring together nearly 100,000 cases of infection.

Source: Bleeping Computer



Source link -101