1 page/≈550 words
Research and Describe Why Do Hackers Want Your Credentials? (Research Paper Sample)
The task was about the reasons that make hackers wish to access people's credentials to log on to the internet, and how they do itsource..
Why Do Hackers Want Your Credentials?
Why do Hackers Want Your Credentials?
We are habitual creatures who have favorite items in our day to day life, for example a coffee cup, or a pen, and maybe even a book. How does it feel when someone steals your favorite pen? This is enough to ruin your whole day, it is even worse when somebody makes off with your book. Now, picture this, a hacker has breached a certain site and got your email account plus its password. They may supply your credentials into an automated tool that will automatically run them against a site they have targeted to see if they work. This may work because we mostly use similar passwords for our accounts. Say, for instance, they access your social media account, and do whatever they are willing to do with it, or worse, they get an access to your bank account, they will have the ability to transfer your money to an account of their choice. This way, your account has been hacked maliciously, and you wonder how it happened. This is known as credential stuffing (Lewis, 2017).
When financial information is successfully in hacker’s hands, they use it in their own individual ways; they can borrow loans, transfer money to other accounts they have created, pay bills and other transactions. The victim’s finances are greatly impacted; it ruins one’s credit card rating. When emails and social media accounts are hacked, a hacker can steal and even post in the accounts of the victim. This will lead to losses and a bad public image of the victim, because even his or her private and confidential information like photographs or videos might be leaked to the public.
What do these hackers have in their sleeves? They use tricks, and these three are their favorite: reusing passwords leaked from other sites, brute force (a bot is used to attempt log ins using weak passwords), and finally phishing (Milner, 2016). Once the hacker has your data, it is run through the following steps; its inventory (looking for personal information and credentials), selling it (the hacked information is packaged and sold in bulk), look for the helpful information (the hacked accounts with greater value are the main targets), offload the cards (example credit card numbers, they are sold to ‘carders’ who use them to buy goods from stores or Amazon.com, and then sell them through dark websites or eBay), selling them in bulk (the authentication credentials are then bundled up and sold at discounted price). Hackers earn loads of money from these steps (Secplicity, 2017).
Examples of recently hacked accounts are like the blog of MSNBC’s Joy Reid, it was allegedly hacked and homophobic content got added to the site. Hackers may sometimes use viruses, which cost companies and countries great...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
- Energy Mix Going Forward and LCOE in Germany (Chapter 2)Description: Net-generation from renewable energy sources in the German power division has expanded from 6.3% in 2000 to around 30% in 2014...13 pages/≈3575 words| 9 Sources | APA | Technology | Research Paper |
- Research and Describe Why Do Hackers Want Your Credentials?Description: We are habitual creatures who have favorite items in our day to day life, for example a coffee cup, or a pen, and maybe even a book. How does it feel when someone steals your favorite pen? ...1 page/≈550 words| 3 Sources | APA | Technology | Research Paper |
- Analysis of Sources Relating to Transformation of TechnologyDescription: Analysis of Sources Relating to Transformation of Technology Research Paper...5 pages/≈1375 words| APA | Technology | Research Paper |