SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Profession
al Ethics
Batacandolo, Lara R.
J3T
Orozco

Mr. Michael M.
360 million newly
stolen credentials on
black market:
cybersecurityFebruary 26, 2014 ·
Jim Finkle, Reuters · Wednesday, firm
11:02 am

From: http://www.interaksyon.com/infotech/360million-newly-stolen-credentials-on-black-marketcybersecurity-firm
BOSTON — A cybersecurity firm said on Tuesday that it
uncovered stolen credentials from some 360 million accounts
that are available for sale on cyber black markets, though it is
unsure where they came from or what they can be used to
access.
The discovery could represent more of a risk to consumers and
companies than stolen credit card data because of the chance
the sets of user names and passwords could open the door to
online bank accounts, corporate networks, health records and
virtually any other type of computer system.

Alex Holden, chief information security officer of Hold Security
LLC, said in an interview that his firm obtained the data over
the past three weeks, meaning an unprecedented amount of
stolen credentials is available for sale underground.
“The sheer volume is overwhelming,” said Holden, whose
firm last year helped uncover a major data breach at Adobe
Systems Inc in which tens of millions of records were stolen.
Holden said he believes the 360 million records were
obtained in separate attacks, including one that yielded
some 105 million records, which would make it the largest
single credential breaches known to date.
He said he believes the credentials were stolen in breaches
that have yet to be publicly reported. The companies
attacked may remain unaware until they are notified by third
parties who find evidence of the hacking, he said.
“We have staff working around the clock to identify the
victims,” he said.
He has not provided any information about the attacks to
other cybersecurity firms or authorities but intends to alert
the companies involved if his staff can identify them.
The massive trove of credentials includes user names, which
are typically email addresses, and passwords that in most
cases are in unencrypted text. Holden said that in contrast,
the Adobe breach, which he uncovered in October 2013,
yielded tens of millions of records that had encrypted
passwords, which made it more difficult for hackers to use
them.
The email addresses are from major providers such as AOL
Inc, Google Inc, Microsoft Corp and Yahoo Inc and almost all
Fortune 500 companies and nonprofit organizations. Holden
said he alerted one major email provider that is a client, but
he declined to identify the company, citing a nondisclosure
agreement.
Heather Bearfield, who runs the cybersecurity practice for
accounting firm Marcum LLP, said she had no information
about the information that Hold Security uncovered but that
it was plausible for hackers to obtain such a large amount of
data because these breaches are on the rise.
She said hackers can do far more harm with stolen
credentials than with stolen payment cards, particularly when
people use the same login and password for multiple
accounts.
“They can get access to your actual bank account. That is
huge,” Bearfield said. “That is not necessarily recoverable
funds.”

After recent payment-card data breaches, including one at
U.S. retailer Target, credit card companies stressed that
consumers bear little risk because they are refunded rapidly
for fraud losses.
Wade Baker, a data breach investigator with Verizon
Communications Inc, said that the number of attacks
targeting payment cards through point-of-sales systems
peaked in 2011. That was partly because banks and retailers
have gotten better at identifying that type of breach and
quickly moving to prevent crooks from making fraudulent
transactions, he said.
In addition to the 360 million credentials, the criminals are
selling some 1.25 billion email addresses, which would be of
interest to spammers, Hold Security said in a statement on its
website

Weitere ähnliche Inhalte

Was ist angesagt?

Major 3rd-Party Data Breaches Of 2018
Major 3rd-Party Data Breaches Of 2018Major 3rd-Party Data Breaches Of 2018
Major 3rd-Party Data Breaches Of 2018NormShield
 
White Paper: Social Login 101
White Paper: Social Login 101White Paper: Social Login 101
White Paper: Social Login 101Gigya
 
18 july st online online security at your fingertips
18 july st online online security at your fingertips18 july st online online security at your fingertips
18 july st online online security at your fingertipsBridget Kow
 
Takeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsTakeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsCBIZ, Inc.
 
Privacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-CommercePrivacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-CommerceNow Dentons
 
Threats to online security and data
Threats to online security and dataThreats to online security and data
Threats to online security and dataAnthonywheeler
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftElizabeth Dimit
 
CRO PROS - Customer Idendity and Access Management via Social login
CRO PROS - Customer Idendity and Access Management via Social loginCRO PROS - Customer Idendity and Access Management via Social login
CRO PROS - Customer Idendity and Access Management via Social loginCatchi
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsBlake A. Klinkner
 
Enjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsEnjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsStephen Cobb
 
Active Directory securing and auditing - Kees Vegter, Neo4j
Active Directory securing and auditing - Kees Vegter, Neo4jActive Directory securing and auditing - Kees Vegter, Neo4j
Active Directory securing and auditing - Kees Vegter, Neo4jNeo4j
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit123
 
The Case of the Suspiciously Flawless Investigation
The Case of the Suspiciously Flawless InvestigationThe Case of the Suspiciously Flawless Investigation
The Case of the Suspiciously Flawless InvestigationSecurityMetrics
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)Kate Dalakova
 

Was ist angesagt? (17)

Major 3rd-Party Data Breaches Of 2018
Major 3rd-Party Data Breaches Of 2018Major 3rd-Party Data Breaches Of 2018
Major 3rd-Party Data Breaches Of 2018
 
White Paper: Social Login 101
White Paper: Social Login 101White Paper: Social Login 101
White Paper: Social Login 101
 
18 july st online online security at your fingertips
18 july st online online security at your fingertips18 july st online online security at your fingertips
18 july st online online security at your fingertips
 
Hacker Hunters Case Study
Hacker Hunters Case StudyHacker Hunters Case Study
Hacker Hunters Case Study
 
Takeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsTakeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security Incidents
 
Privacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-CommercePrivacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-Commerce
 
Threats to online security and data
Threats to online security and dataThreats to online security and data
Threats to online security and data
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
CRO PROS - Customer Idendity and Access Management via Social login
CRO PROS - Customer Idendity and Access Management via Social loginCRO PROS - Customer Idendity and Access Management via Social login
CRO PROS - Customer Idendity and Access Management via Social login
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
 
Enjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsEnjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber Criminals
 
Active Directory securing and auditing - Kees Vegter, Neo4j
Active Directory securing and auditing - Kees Vegter, Neo4jActive Directory securing and auditing - Kees Vegter, Neo4j
Active Directory securing and auditing - Kees Vegter, Neo4j
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification stream
 
The Case of the Suspiciously Flawless Investigation
The Case of the Suspiciously Flawless InvestigationThe Case of the Suspiciously Flawless Investigation
The Case of the Suspiciously Flawless Investigation
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
 

Andere mochten auch

Delhi , new delhi transit bus branding advertising transit - shrii ganne...
Delhi ,  new delhi transit  bus branding advertising    transit - shrii ganne...Delhi ,  new delhi transit  bus branding advertising    transit - shrii ganne...
Delhi , new delhi transit bus branding advertising transit - shrii ganne...Suraj Partaap Singh
 
Chatrapati Shivaji Mumbai Airport Outdoor Advertising Advertisement Branding ...
Chatrapati Shivaji Mumbai Airport Outdoor Advertising Advertisement Branding ...Chatrapati Shivaji Mumbai Airport Outdoor Advertising Advertisement Branding ...
Chatrapati Shivaji Mumbai Airport Outdoor Advertising Advertisement Branding ...Suraj Partaap Singh
 
Karnataka & Banglore Bus Buses Advertising Advertisement Branding - Shrii Gan...
Karnataka & Banglore Bus Buses Advertising Advertisement Branding - Shrii Gan...Karnataka & Banglore Bus Buses Advertising Advertisement Branding - Shrii Gan...
Karnataka & Banglore Bus Buses Advertising Advertisement Branding - Shrii Gan...Suraj Partaap Singh
 
หน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้น
หน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้นหน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้น
หน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้นaun-twn
 
Hoarding, unipole, billboard, gantry, bus shelter etc Advertising - Pan India
Hoarding, unipole, billboard, gantry, bus shelter etc Advertising - Pan IndiaHoarding, unipole, billboard, gantry, bus shelter etc Advertising - Pan India
Hoarding, unipole, billboard, gantry, bus shelter etc Advertising - Pan IndiaSuraj Partaap Singh
 
อุปกรณ์เครือข่าย
อุปกรณ์เครือข่ายอุปกรณ์เครือข่าย
อุปกรณ์เครือข่ายaun-twn
 
Manzoor nazar khan Afridi Khattak
Manzoor nazar khan Afridi KhattakManzoor nazar khan Afridi Khattak
Manzoor nazar khan Afridi KhattakNazik Taimoor
 
หน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้น
หน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้นหน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้น
หน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้นaun-twn
 
Jadi pengusaha tanpa otak
Jadi pengusaha tanpa otakJadi pengusaha tanpa otak
Jadi pengusaha tanpa otakTeguh Liberty
 
Airport branding Advertising - Pan India
Airport branding Advertising - Pan IndiaAirport branding Advertising - Pan India
Airport branding Advertising - Pan IndiaSuraj Partaap Singh
 
Sukses dengan Positive Thinking
Sukses dengan Positive ThinkingSukses dengan Positive Thinking
Sukses dengan Positive ThinkingTeguh Liberty
 
หน่วยที่ 3 รูปร่างเครือข่าย (topology)
หน่วยที่ 3  รูปร่างเครือข่าย (topology)หน่วยที่ 3  รูปร่างเครือข่าย (topology)
หน่วยที่ 3 รูปร่างเครือข่าย (topology)aun-twn
 
Mumbai kiosk Outdoor Advertising Advertising Media - Shrii Ganness Advt - Uni...
Mumbai kiosk Outdoor Advertising Advertising Media - Shrii Ganness Advt - Uni...Mumbai kiosk Outdoor Advertising Advertising Media - Shrii Ganness Advt - Uni...
Mumbai kiosk Outdoor Advertising Advertising Media - Shrii Ganness Advt - Uni...Suraj Partaap Singh
 

Andere mochten auch (14)

Delhi , new delhi transit bus branding advertising transit - shrii ganne...
Delhi ,  new delhi transit  bus branding advertising    transit - shrii ganne...Delhi ,  new delhi transit  bus branding advertising    transit - shrii ganne...
Delhi , new delhi transit bus branding advertising transit - shrii ganne...
 
Chatrapati Shivaji Mumbai Airport Outdoor Advertising Advertisement Branding ...
Chatrapati Shivaji Mumbai Airport Outdoor Advertising Advertisement Branding ...Chatrapati Shivaji Mumbai Airport Outdoor Advertising Advertisement Branding ...
Chatrapati Shivaji Mumbai Airport Outdoor Advertising Advertisement Branding ...
 
Karnataka & Banglore Bus Buses Advertising Advertisement Branding - Shrii Gan...
Karnataka & Banglore Bus Buses Advertising Advertisement Branding - Shrii Gan...Karnataka & Banglore Bus Buses Advertising Advertisement Branding - Shrii Gan...
Karnataka & Banglore Bus Buses Advertising Advertisement Branding - Shrii Gan...
 
หน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้น
หน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้นหน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้น
หน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้น
 
Meditation
MeditationMeditation
Meditation
 
Hoarding, unipole, billboard, gantry, bus shelter etc Advertising - Pan India
Hoarding, unipole, billboard, gantry, bus shelter etc Advertising - Pan IndiaHoarding, unipole, billboard, gantry, bus shelter etc Advertising - Pan India
Hoarding, unipole, billboard, gantry, bus shelter etc Advertising - Pan India
 
อุปกรณ์เครือข่าย
อุปกรณ์เครือข่ายอุปกรณ์เครือข่าย
อุปกรณ์เครือข่าย
 
Manzoor nazar khan Afridi Khattak
Manzoor nazar khan Afridi KhattakManzoor nazar khan Afridi Khattak
Manzoor nazar khan Afridi Khattak
 
หน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้น
หน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้นหน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้น
หน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้น
 
Jadi pengusaha tanpa otak
Jadi pengusaha tanpa otakJadi pengusaha tanpa otak
Jadi pengusaha tanpa otak
 
Airport branding Advertising - Pan India
Airport branding Advertising - Pan IndiaAirport branding Advertising - Pan India
Airport branding Advertising - Pan India
 
Sukses dengan Positive Thinking
Sukses dengan Positive ThinkingSukses dengan Positive Thinking
Sukses dengan Positive Thinking
 
หน่วยที่ 3 รูปร่างเครือข่าย (topology)
หน่วยที่ 3  รูปร่างเครือข่าย (topology)หน่วยที่ 3  รูปร่างเครือข่าย (topology)
หน่วยที่ 3 รูปร่างเครือข่าย (topology)
 
Mumbai kiosk Outdoor Advertising Advertising Media - Shrii Ganness Advt - Uni...
Mumbai kiosk Outdoor Advertising Advertising Media - Shrii Ganness Advt - Uni...Mumbai kiosk Outdoor Advertising Advertising Media - Shrii Ganness Advt - Uni...
Mumbai kiosk Outdoor Advertising Advertising Media - Shrii Ganness Advt - Uni...
 

Ähnlich wie Cybercrime issue

List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022ndcmanagement
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response PlanningPECB
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
 
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxSecurity Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxacarolyn
 
The Cost Of Hacking
The Cost Of HackingThe Cost Of Hacking
The Cost Of Hackingbluecoatss
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryProtected Harbor
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013Shoplet_
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013post_it
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...MZERMA Amine
 
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxTECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxerlindaw
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxtidwellveronique
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decadestudentinternetdeals33
 
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
 Business Fraud and Cybersecurity Best Practices in the Office or While Worki... Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...ArielMcCurdy
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfProtected Harbor
 
Case in PointInaction Caused Costly Hacking At Large Retailer.docx
Case in PointInaction Caused Costly Hacking At Large Retailer.docxCase in PointInaction Caused Costly Hacking At Large Retailer.docx
Case in PointInaction Caused Costly Hacking At Large Retailer.docxcowinhelen
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftMartha Brown
 

Ähnlich wie Cybercrime issue (20)

List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxSecurity Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
 
The Cost Of Hacking
The Cost Of HackingThe Cost Of Hacking
The Cost Of Hacking
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout History
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
 
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxTECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade
 
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
 Business Fraud and Cybersecurity Best Practices in the Office or While Worki... Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
 
Case in PointInaction Caused Costly Hacking At Large Retailer.docx
Case in PointInaction Caused Costly Hacking At Large Retailer.docxCase in PointInaction Caused Costly Hacking At Large Retailer.docx
Case in PointInaction Caused Costly Hacking At Large Retailer.docx
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
 

Cybercrime issue

  • 1. Profession al Ethics Batacandolo, Lara R. J3T Orozco Mr. Michael M.
  • 2.
  • 3. 360 million newly stolen credentials on black market: cybersecurityFebruary 26, 2014 · Jim Finkle, Reuters · Wednesday, firm 11:02 am From: http://www.interaksyon.com/infotech/360million-newly-stolen-credentials-on-black-marketcybersecurity-firm
  • 4. BOSTON — A cybersecurity firm said on Tuesday that it uncovered stolen credentials from some 360 million accounts that are available for sale on cyber black markets, though it is unsure where they came from or what they can be used to access. The discovery could represent more of a risk to consumers and companies than stolen credit card data because of the chance the sets of user names and passwords could open the door to online bank accounts, corporate networks, health records and virtually any other type of computer system. Alex Holden, chief information security officer of Hold Security LLC, said in an interview that his firm obtained the data over the past three weeks, meaning an unprecedented amount of stolen credentials is available for sale underground.
  • 5. “The sheer volume is overwhelming,” said Holden, whose firm last year helped uncover a major data breach at Adobe Systems Inc in which tens of millions of records were stolen. Holden said he believes the 360 million records were obtained in separate attacks, including one that yielded some 105 million records, which would make it the largest single credential breaches known to date. He said he believes the credentials were stolen in breaches that have yet to be publicly reported. The companies attacked may remain unaware until they are notified by third parties who find evidence of the hacking, he said. “We have staff working around the clock to identify the victims,” he said.
  • 6. He has not provided any information about the attacks to other cybersecurity firms or authorities but intends to alert the companies involved if his staff can identify them. The massive trove of credentials includes user names, which are typically email addresses, and passwords that in most cases are in unencrypted text. Holden said that in contrast, the Adobe breach, which he uncovered in October 2013, yielded tens of millions of records that had encrypted passwords, which made it more difficult for hackers to use them. The email addresses are from major providers such as AOL Inc, Google Inc, Microsoft Corp and Yahoo Inc and almost all Fortune 500 companies and nonprofit organizations. Holden said he alerted one major email provider that is a client, but he declined to identify the company, citing a nondisclosure agreement.
  • 7. Heather Bearfield, who runs the cybersecurity practice for accounting firm Marcum LLP, said she had no information about the information that Hold Security uncovered but that it was plausible for hackers to obtain such a large amount of data because these breaches are on the rise. She said hackers can do far more harm with stolen credentials than with stolen payment cards, particularly when people use the same login and password for multiple accounts. “They can get access to your actual bank account. That is huge,” Bearfield said. “That is not necessarily recoverable funds.” After recent payment-card data breaches, including one at U.S. retailer Target, credit card companies stressed that consumers bear little risk because they are refunded rapidly for fraud losses.
  • 8. Wade Baker, a data breach investigator with Verizon Communications Inc, said that the number of attacks targeting payment cards through point-of-sales systems peaked in 2011. That was partly because banks and retailers have gotten better at identifying that type of breach and quickly moving to prevent crooks from making fraudulent transactions, he said. In addition to the 360 million credentials, the criminals are selling some 1.25 billion email addresses, which would be of interest to spammers, Hold Security said in a statement on its website