ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

After a Hacker Stole 1.17 Billion Credentials, What He Did Next Will Leave You Dumbfounded

After a Hacker Stole 1.17 Billion Credentials, What He Did Next Will Leave You Dumbfounded

Unfortunately, stories of major data breaches are the norm in today’s news cycle. However, what often gets left out of the story is how the hacker profits from the stolen data. In the case of a recent major hack in Russia of more than one billion credentials, what the hacker did with all of this data has us scratching our heads.

The bizarre case is reported by Alex Holden of Hold Security, who was alerted to the hack by reading about it on an online forum--posted by the hacker himself! Right away, this move comes off as odd, seeing as most hackers try their darndest to keep their handiwork under wraps for as long as possible. After all, the longer a data breach goes undetected, the more valuable the stolen data will be on the black market.

What’s more, the sheer size of this hack is mind boggling, with more than a billion credentials stolen from the Russian service Mail.ru, along with additional account information from Google, Yahoo, Microsoft, and other major email providers from countries such as China and Germany. In total, 1.17 billion records from these services were lifted, which included username and password combinations from U.S.-based accounts connected with major banks, retailers, and manufacturers.

For a haul this large, the hacker could have had himself a major payday. Yet, his asking price for the cache was a mere 50 rubles (less than one American dollar).

Holden responded by haggling for possession of the stolen data, refusing to pay any money. Instead, he was able to convince the hacker to turn over all of the stolen credentials in exchange for a few “likes” on a social media page.

However, just because the credentials have been turned over to Hold Security, doesn’t mean that the hacker hadn’t previously turned them over to other parties with nefarious purposes in mind. Further data breaches could result from this one major breach, and additional hackers can use information from the stolen credentials to engineer new ways of accessing new accounts. Reasons like this are why you should always be vigilant when it comes to protecting your online identity.

To protect your own online accounts from hackers, be sure to follow best security practices like regularly changing your passwords and using complex characters for your passwords. These simple measures will go a long way toward keeping your account safe, should your credentials ever be compromised. However, there are plenty of additional security measures that you should take, along with enterprise-level security solutions that you’ll want to implement, especially when dealing with the network security of your organization.

To learn more about how ClearView IT can protect you from the wily ways of hackers, give us a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware Smartphone communications Microsoft Office Small Business Upgrade Smartphones Network Mobile Devices Managed IT Services Communication Data Recovery Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Passwords Holiday Disaster Recovery Covid-19 Managed Service Windows 10 IT Support Browser Apps Miscellaneous Cloud Computing Outsourced IT Data Management Managed Service Provider Remote Work Internet of Things Saving Money Operating System Government Workplace Strategy Networking Windows Artificial Intelligence Managed IT services Gadgets Mobile Device Management Information Encryption Server App Virtualization WiFi Spam Blockchain Business Technology Bandwidth Remote Employee/Employer Relationship History Apple Gmail Information Technology Office Two-factor Authentication Office 365 Budget Access Control Health Data Security Big Data Analytics BDR Wi-Fi Conferencing Cybercrime Compliance Employer-Employee Relationship Cost Management Vendor Patch Management Help Desk Voice over Internet Protocol Hacking Remote Computing Document Management Remote Monitoring Save Money Hacker IT Management Training Augmented Reality Best Practice Computing Word Vendor Management Hard Drive IBM Retail Applications Website Alert Hiring/Firing Mobile Office Vulnerabilities Outlook Legal Password Project Management Managed Services Data storage Money Data loss Customer Service Unified Threat Management Firewall BYOD Search... iPhone Education Cortana Storage Update Data Breach Content Filtering Twitter Router Paperless Office Antivirus User Law Enforcement Remote Workers Windows 11 End of Support The Internet of Things Printer Maintenance Monitoring YouTube Windows 7 Free Resource Healthcare Chrome Laptop How To Websites Travel Meetings Mobility Virtual Reality Social Engineering Cryptocurrency Mobile Computing Black Market Google Maps Social Scam Sports Cleaning SaaS DDoS Marketing Robot Running Cable VPN Solid State Drive Tech Terms Cooperation Managed IT Video Conferencing Lithium-ion battery Digital Drones Virtual Machines Chromebook Processor Computer Repair Taxes Automobile Processors Professional Services How To HIPAA Microchip Flexibility Physical Security Multi-factor Authentication Managed Services Provider Virtual Private Network Hack Identity Theft Notifications Saving Time Wireless Technology Current Events eWaste Start Menu Unified Communications Computer Care Downloads Google Docs Computers Bitcoin Solutions Vulnerability Bluetooth Downtime Safety Distributed Denial of Service PowerPoint Telephone Administration Software as a Service Office Tips Images 101 Integration Display Private Cloud Memory Data Protection Virtual Desktop Presentation Specifications Experience Excel IT Consultant Employees Avoiding Downtime Politics Machine Learning Customer Relationship Management Settings Co-Managed IT Holidays Entertainment Disaster Virtual Assistant Desktop Virtual Machine Tablet Content G Suite VoIP Electronic Medical Records Hosted Solution Tracking Accountants Reviews Optimization Workplace Strategies Mouse Business Metrics Teamwork Books Database 2FA Recovery Competition Web Server Data Storage Hypervisor Language Society Health IT LiFi Digital Payment Equifax Shopping Entrepreneur SharePoint Medical IT SQL Server Reading Monitors Worker Tactics Paperless Documents Visible Light Communication Hard Drive Disposal Application PCI DSS Licensing Business Intelligence Access Username Windows 8 Time Management Public Cloud Startup Gig Economy Freedom of Information Humor Smart Technology Troubleshooting Azure Relocation Navigation Displays Addiction Business Communications Securty Advertising email scam Internet Service Provider Tech Support Mobile Security Regulations Compliance Domains Managed IT Service Audit Work/Life Balance Spyware User Tip File Sharing Legislation News Memes Redundancy Evernote Network Management Human Resources Net Neutrality Financial Data In Internet of Things Cache Hacks Unified Threat Management Proxy Server Network Congestion Workers Emails Risk Management Fake News IT Supply Chain Business Owner Reliable Computing Writing Service Level Agreement Google Apps Computing Infrastructure Public Speaking Streaming Media CCTV Device security Telework Printing Management Touchscreen Wireless Headphones Smartwatch Microsoft Excel Communitications Keyboard Workplace Microsoft 365 Hard Drives Scalability Emergency Tech Going Green Computer Malfunction Business Cards Procurement Proactive IT FinTech intranet Administrator Text Messaging Vendor Mangement Error Inbound Marketing Bring Your Own Device Bookmark Samsung CES Wireless IT Assessment Shortcut Scams Heating/Cooling Value Environment Term Uninterrupted Power Supply Download Webcam Piracy Supply Chain Management Windows XP Music HTML Organization Cyber security Social Networking Business Mangement Browsers Tablets Nanotechnology Smart Devices Cables Remote Working Electronic Payment Google Play Upload Software License Supercomputer AI Trend Micro Botnet Google Calendar Social Network Transportation Rental Service Virus Data Analysis Micrsooft Screen Reader Digital Security Cameras Electronic Health Records Point of Sale Wasting Time Security Cameras Phone System Flash Trends Motion Sickness Mobile Technology Customer Resource management Business Growth Devices eCommerce Shortcuts Comparison Modem Telephone Systems Google Drive Fileless Malware Videos Staffing Tip of the week Surveillance Company Culture IP Address Managing Costs Knowledge Corporate Profile Gamification Telephone System Google Wallet Employer Employee Relationship Regulations Be Proactive Television SSID Banking Telephony Employer/Employee Relationships Messenger Directions Computer Accessories Deep Learning Cabling Backup and Disaster Recovery Media Development

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?