1 page/≈550 words
Research and Describe Why Do Hackers Want Your Credentials? (Research Paper Sample)
The task was about the reasons that make hackers wish to access people's credentials to log on to the internet, and how they do itsource..
Why Do Hackers Want Your Credentials?
Why do Hackers Want Your Credentials?
We are habitual creatures who have favorite items in our day to day life, for example a coffee cup, or a pen, and maybe even a book. How does it feel when someone steals your favorite pen? This is enough to ruin your whole day, it is even worse when somebody makes off with your book. Now, picture this, a hacker has breached a certain site and got your email account plus its password. They may supply your credentials into an automated tool that will automatically run them against a site they have targeted to see if they work. This may work because we mostly use similar passwords for our accounts. Say, for instance, they access your social media account, and do whatever they are willing to do with it, or worse, they get an access to your bank account, they will have the ability to transfer your money to an account of their choice. This way, your account has been hacked maliciously, and you wonder how it happened. This is known as credential stuffing (Lewis, 2017).
When financial information is successfully in hacker’s hands, they use it in their own individual ways; they can borrow loans, transfer money to other accounts they have created, pay bills and other transactions. The victim’s finances are greatly impacted; it ruins one’s credit card rating. When emails and social media accounts are hacked, a hacker can steal and even post in the accounts of the victim. This will lead to losses and a bad public image of the victim, because even his or her private and confidential information like photographs or videos might be leaked to the public.
What do these hackers have in their sleeves? They use tricks, and these three are their favorite: reusing passwords leaked from other sites, brute force (a bot is used to attempt log ins using weak passwords), and finally phishing (Milner, 2016). Once the hacker has your data, it is run through the following steps; its inventory (looking for personal information and credentials), selling it (the hacked information is packaged and sold in bulk), look for the helpful information (the hacked accounts with greater value are the main targets), offload the cards (example credit card numbers, they are sold to ‘carders’ who use them to buy goods from stores or Amazon.com, and then sell them through dark websites or eBay), selling them in bulk (the authentication credentials are then bundled up and sold at discounted price). Hackers earn loads of money from these steps (Secplicity, 2017).
Examples of recently hacked accounts are like the blog of MSNBC’s Joy Reid, it was allegedly hacked and homophobic content got added to the site. Hackers may sometimes use viruses, which cost companies and countries great...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
- About How Effect We Can Benefit From Online ClassesDescription: How can one teach effectively online? What methods must be employed in making sure it is a success? Because of the increasing need for learning and diverse geographical locations of people willing to learn, there is a need to bring them all together and satisfy their needs....1 page/≈275 words| 3 Sources | APA | Technology | Research Paper |
- The Expansion Of Space Programs By The Developed CountriesDescription: Ongoing advancements in technology and multiple logistical advantages have encouraged the expansion of space programs by the developed countries with many others accelerating the development of space related technologies....4 pages/≈1100 words| 4 Sources | APA | Technology | Research Paper |
- Fine Line Organisation Face Using Video TechnologyDescription: For proper security in every organization, video technology cameras, mounted in a place that makes it impossible to destroy with or disable but gives a good view of persons entering and leaving should be installed. ...1 page/≈550 words| 2 Sources | APA | Technology | Research Paper |