• Latest
  • Trending
  • All
  • News
Malware Exposes Over 100K Hacking Forum Accounts, Researchers Reveal

Malware Exposes Over 100K Hacking Forum Accounts, Researchers Reveal

August 18, 2023
Preparing for Quantum-Powered Attacks: A Guide for Businesses

Preparing for Quantum-Powered Attacks: A Guide for Businesses

October 2, 2023
The Impending Threat of 'Steal Now, Crack Later' Quantum Computing

The Impending Threat of ‘Steal Now, Crack Later’ Quantum Computing

September 25, 2023
The Dominance of Email as the Primary Attack Vector

The Dominance of Email as the Primary Attack Vector

September 18, 2023
Devastating Ransomware Attack Paralyzes Danish Cloud Provider

Devastating Ransomware Attack Paralyzes Danish Cloud Provider

September 11, 2023
The Future Landscape of Ransomware Business Models: Examining Realistic Scenarios and Emerging Threats

The Future Landscape of Ransomware Business Models: Examining Realistic Scenarios and Emerging Threats

September 4, 2023
Understanding the GoAnywhere Data Breach and its Implications

Understanding the GoAnywhere Data Breach and its Implications

August 24, 2023
Safeguarding Your Identity: A Comprehensive Guide to Detecting Identity Theft

Safeguarding Your Identity: A Comprehensive Guide to Detecting Identity Theft

August 23, 2023
Identity Theft: Steps to Take in Case of a Breach

Identity Theft: Steps to Take in Case of a Breach

August 22, 2023
Enhancing Organizational Security Posture through Encryption: Key Tips

Enhancing Organizational Security Posture through Encryption: Key Tips

August 22, 2023

Understanding the Potential Threat of ‘Steal Now, Crack Later’ Attacks in Quantum Computing

August 21, 2023
Business Email Compromise Attack: A Costly Threat That Surpasses Ransomware Losses

Business Email Compromise Attack: A Costly Threat That Surpasses Ransomware Losses

August 21, 2023
The Challenges of Patching Vulnerabilities and the Importance of Prioritization

The Challenges of Patching Vulnerabilities and the Importance of Prioritization

August 20, 2023
  • About
  • Advertise
  • Privacy & Policy
  • Contact
26 °c
Ashburn
28 ° Thu
26 ° Fri
24 ° Sat
24 ° Sun
24 ° Mon
24 ° Tue
REPORT NEW Vulnerability
Tuesday, October 3, 2023
No Result
View All Result
  • Login
  • Register
Innocent Michael
  • Home
  • Solutions
  • Our Lab
    • Threat Scanner
    • Virus
    • Malware
    • Spyware
  • News
  • Products
    • Domains – Search, Register & Transfer
      • Overview
      • Register Domain
      • Transfer domain
      • Domain Renewal
      • My Domains
    • AntiVirus Protection Plan
    • Website Design Assist
    • Professional Streaming Studio
    • Legal Office Management Tool
    • Auto Attendant – Virtual Business Phone Numbers & Phone System
  • Businesses
  • Information
  • Company
  • Legal
Innocent Michael
No Result
View All Result
Home Malware

Malware Exposes Over 100K Hacking Forum Accounts, Researchers Reveal

Cyber Intelligence by Cyber Intelligence
2 months ago
in Malware
252 2
A A
0
Malware Exposes Over 100K Hacking Forum Accounts, Researchers Reveal
494
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter

Researchers Uncover 120,000 Infected Systems with Exposed Credentials for Cybercrime Forums

In a recent discovery, threat researchers from Hudson Rock, a leading threat intelligence company, have found that over 100,000 computers, many belonging to hackers, have been compromised by info-stealing malware. Through an analysis of publicly available leaks and info-stealer logs obtained from threat actors, the researchers were able to gather data on more than 140,000 credentials for cybercrime forums.

Related articles

Knight Ransomware Targets Users with Fake TripAdvisor Complaints in Ongoing Spam Campaign

Knight Ransomware Targets Users with Fake TripAdvisor Complaints in Ongoing Spam Campaign

2 months ago
1.4k
FBI Issues Warning: Mobile Beta-Testing Apps Pose Significant Security Risks

FBI Issues Warning: Mobile Beta-Testing Apps Pose Significant Security Risks

2 months ago
1.4k

Interestingly, the analysis revealed that passwords used for hacking forums were generally stronger than those used for government websites. This finding sheds light on the precautions taken by hackers to protect their own accounts within their respective communities.

The compromised computers were inadvertently infected by hackers who fell victim to fake software promotions or infected software downloads through YouTube tutorials. These infections occurred opportunistically, affecting all users, including less skilled hackers seeking shortcuts in their activities.

By examining the info-stealer logs, the researchers were able to identify the real identities of the compromised computer owners. Additionally, the researchers discovered additional credentials, auto-fill data containing personal information, and system information on the infected systems. This information allowed them to determine that over 57,000 compromised users had accounts on the Nulled[.]to community, known for its cybercriminal activities.

It is worth noting that while passwords for hacking forums exhibited strength, there were instances of weak passwords, such as consecutive numbers, indicating a lack of interest in active participation within the community. Many hackers simply used these accounts to keep informed about discussions, data for sale, or for timely access to the forum.

Remarkably, the credentials for cybercrime forums were found to be stronger overall compared to logins for government websites, although the margin was not significant. Hudson Rock attributed most of the infections to three popular info-stealers: RedLine, Raccoon, and Azorult.

This recent revelation highlights the importance of robust cybersecurity practices and serves as a reminder that even hackers themselves can fall victim to malicious attacks. Cybersecurity remains a critical aspect of our digital landscape, necessitating the continuous improvement of defenses against info-stealing malware.

The researchers also discovered that the credentials for cybercrime forums were generally stronger than the logins for government websites, although the difference is not large. according to Hudson Rock, most of the infections were from just three info-stealers, which also happen to be popular choices with many hackers: RedLine, Raccoon, and Azorult.

Share198Tweet124
Cyber Intelligence

Cyber Intelligence

Subscribe
Connect with
Login
I allow to create an account
When you login first time using a Social Login button, we collect your account public profile information shared by Social Login provider, based on your privacy settings. We also get your email address to automatically create an account for you in our website. Once your account is created, you'll be logged-in to this account.
DisagreeAgree
Notify of
guest
I allow to create an account
When you login first time using a Social Login button, we collect your account public profile information shared by Social Login provider, based on your privacy settings. We also get your email address to automatically create an account for you in our website. Once your account is created, you'll be logged-in to this account.
DisagreeAgree
guest
0 Comments
Inline Feedbacks
View all comments
Innocent Michael

Copyright © 2023 Inncent Michael.

Navigate Site

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Follow Us

No Result
View All Result
  • Home
  • Solutions
  • Our Lab
    • Threat Scanner
    • Virus
    • Malware
    • Spyware
  • News
  • Products
    • Domains – Search, Register & Transfer
      • Overview
      • Register Domain
      • Transfer domain
      • Domain Renewal
      • My Domains
    • AntiVirus Protection Plan
    • Website Design Assist
    • Professional Streaming Studio
    • Legal Office Management Tool
    • Auto Attendant – Virtual Business Phone Numbers & Phone System
  • Businesses
  • Information
  • Company
  • Legal
  • Login
  • Sign Up
REPORT NEW Vulnerability

Welcome Back!

Sign In with Google
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
OR

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply
Update Contents