

As attackers use leaked information for malicious purposes, they can also sell these information in exchange for money. In Yahoo case, many valuable information are leaked and sold in Dark Web.

The type of leaked data is very important. Different types of data can be leaked according to services which are produced by target site. It is understood that leaked data is not limited only emails and passwords. The more an attacker knows about an user, the more he’s capable of. Attackers can call a victim by introducing themselves as a bank employee or can call banks by introducing themselves as a real user. Because, these information are used to verify the user.


One of the worst parts of the incident is that they cause to leak different kind of personal information such as security questions, birthday, telephone numbers etc. The New York Times reports that a billion-user database was sold on the Dark Web last August for $300,000. The interesting thing is that the announcement is published in September 2016. Yahoo says they believe that no payment card or bank account information was stolen. The stolen data include names, email addresses, telephone numbers, birthdays, hashed passwords, and some “encrypted or unencrypted security questions and answers. After that, the company has also announced another attack, known as Disclosed Wednesday occurred in 2013, that causes more than 1 billion accounts to be compromised. Until this time, the information could be used so many times for malicious activity.įor example, Yahoo announced its hacking incident known as September Disclosure occurred in 2014 that causes 500 million user accounts to be hacked. But the sharing of these announcements may take a while after the information is shared on the internet. In the event of an attack, companies must inform their customers. Users may not be aware of leakage of their sensitive information, even if their emails and passwords are leaked on the internet. One other handicap about this danger is hacking incidents has been announced long after the incident happened. In the occurrence of hacking incidents, initially, attackers sell this information in exchange for money in underground forums or use it for malicious purposes. But this incident caused a large amount of damage to the American stock market in a short time.Īttackers can also communicate with other attackers who uses hacked account and can gather some valuable information so easily. In 2011, Twitter account of a well-known news channel was hacked, and attackers shared six different tweet for #ObamaIsDead. If leaked emails and passwords are leaked from one of the well-known social medias, attackers can share some post which can make damaging disturbances to the company’s reputation. If a simple forum where a user member of it is hacked, attackers can go further to steal user’s credit card information with trying to log in another sites (e.g famous online shopping sites) using leaked email and passwords. Leaked emails and passwords are dangerous independently of leaking source. Employees who don’t want to deal with different passwords for each application may use the same passwords for many applications including company’s applications. Even if leakage source is independent from the company, attackers can use leaked passwords in order to log in applications of the company with using employee’s corporation e-mail. Attackers can try to enter your system using this information. So, leaked e-mails and passwords are very dangerous, if these credentials are used for different accounts too. Most of the internet users use same passwords for their different web application accounts. These types of attacks are widely used today. The disclosed information may be personal information or may be information which has high importance for the company. This type of attack can reveal information about employees which have little awareness.
Pokerist hack 2014 update#
The phishing email will typically direct the user to visit a website where they are asked to update personal information, such as a password, credit card number, social security number, or bank account credentials, that the legitimate organization already has. In the simplest form, email list of employees can be used for phishing attack or to brute-force to login forms.
