ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

After a Hacker Stole 1.17 Billion Credentials, What He Did Next Will Leave You Dumbfounded

After a Hacker Stole 1.17 Billion Credentials, What He Did Next Will Leave You Dumbfounded

Unfortunately, stories of major data breaches are the norm in today’s news cycle. However, what often gets left out of the story is how the hacker profits from the stolen data. In the case of a recent major hack in Russia of more than one billion credentials, what the hacker did with all of this data has us scratching our heads.

The bizarre case is reported by Alex Holden of Hold Security, who was alerted to the hack by reading about it on an online forum--posted by the hacker himself! Right away, this move comes off as odd, seeing as most hackers try their darndest to keep their handiwork under wraps for as long as possible. After all, the longer a data breach goes undetected, the more valuable the stolen data will be on the black market.

What’s more, the sheer size of this hack is mind boggling, with more than a billion credentials stolen from the Russian service Mail.ru, along with additional account information from Google, Yahoo, Microsoft, and other major email providers from countries such as China and Germany. In total, 1.17 billion records from these services were lifted, which included username and password combinations from U.S.-based accounts connected with major banks, retailers, and manufacturers.

For a haul this large, the hacker could have had himself a major payday. Yet, his asking price for the cache was a mere 50 rubles (less than one American dollar).

Holden responded by haggling for possession of the stolen data, refusing to pay any money. Instead, he was able to convince the hacker to turn over all of the stolen credentials in exchange for a few “likes” on a social media page.

However, just because the credentials have been turned over to Hold Security, doesn’t mean that the hacker hadn’t previously turned them over to other parties with nefarious purposes in mind. Further data breaches could result from this one major breach, and additional hackers can use information from the stolen credentials to engineer new ways of accessing new accounts. Reasons like this are why you should always be vigilant when it comes to protecting your online identity.

To protect your own online accounts from hackers, be sure to follow best security practices like regularly changing your passwords and using complex characters for your passwords. These simple measures will go a long way toward keeping your account safe, should your credentials ever be compromised. However, there are plenty of additional security measures that you should take, along with enterprise-level security solutions that you’ll want to implement, especially when dealing with the network security of your organization.

To learn more about how ClearView IT can protect you from the wily ways of hackers, give us a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Data Backup Ransomware communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Communication Managed IT Services Data Recovery Productivity Quick Tips VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Covid-19 Disaster Recovery Passwords Holiday Apps Managed Service Windows 10 IT Support Browser Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Data Management Remote Work Internet of Things Operating System Government Saving Money Managed IT services Networking Gadgets Windows Workplace Strategy Artificial Intelligence Bandwidth Server Encryption Information App Remote Virtualization Mobile Device Management Spam Business Technology Blockchain WiFi Budget Gmail History Office Employee/Employer Relationship Two-factor Authentication Office 365 Apple Information Technology Cybercrime Access Control Data Security Wi-Fi Big Data BDR Health Analytics Conferencing Compliance Save Money Patch Management Vendor Help Desk Remote Monitoring Hacking Employer-Employee Relationship Cost Management IT Management Remote Computing Hacker Training Voice over Internet Protocol Document Management Data storage Augmented Reality Word IBM Applications Website Search... Project Management Best Practice BYOD Vulnerabilities Computing Retail Vendor Management Alert Hard Drive Hiring/Firing Outlook Money Password Data loss Mobile Office Customer Service Legal Unified Threat Management Firewall Managed Services Update How To iPhone Education Cortana Travel Mobile Computing Data Breach Content Filtering Virtual Reality Social Engineering Marketing Cryptocurrency Paperless Office Antivirus Black Market Router Running Cable Maintenance Cleaning Robot The Internet of Things Storage YouTube Monitoring Healthcare Websites Laptop Mobility Meetings Windows 11 User Google Maps Twitter Scam Law Enforcement Remote Workers End of Support Sports Social Printer VPN Chrome SaaS DDoS Windows 7 Free Resource Managed IT Notifications Current Events Digital PowerPoint Unified Communications Virtual Assistant Disaster Administration Google Docs Solutions Bluetooth Presentation Taxes Distributed Denial of Service Lithium-ion battery Specifications Integration IT Consultant Office Tips Images 101 Private Cloud Display Processor Memory Customer Relationship Management Processors Physical Security Co-Managed IT Employees Entertainment Politics Avoiding Downtime Machine Learning Settings Multi-factor Authentication Holidays Start Menu Solid State Drive Downloads Computer Care Cooperation Vulnerability Saving Time Wireless Technology Video Conferencing eWaste Drones Virtual Machines Chromebook Software as a Service Data Protection Computers HIPAA Bitcoin Computer Repair Downtime Automobile Safety Professional Services Telephone How To Virtual Desktop Microchip Flexibility Excel Experience Managed Services Provider Tech Terms Virtual Private Network Hack Identity Theft Telephone System Regulations Smartwatch Communitications Microsoft 365 Cables Scalability Directions Backup and Disaster Recovery Web Server Procurement Digital Payment Desktop FinTech Administrator SharePoint Text Messaging Content Proactive IT Electronic Medical Records Electronic Payment Worker Accountants CES IT Assessment Bring Your Own Device Point of Sale Supply Chain Management Competition Value Access Database Recovery Public Cloud Organization Cyber security Shortcuts Time Management Music Health IT Equifax Phone System LiFi Smart Devices Entrepreneur Documents Remote Working Application Audit Spyware Tactics Hard Drive Disposal File Sharing AI Botnet Trend Micro Business Intelligence Be Proactive Username Transportation Redundancy Micrsooft Startup Digital Security Cameras Freedom of Information Electronic Health Records Rental Service Securty Wasting Time Navigation Flash Cache Addiction email scam Workers Mobile Security Computer Accessories Domains eCommerce Telephone Systems Modem Workplace Strategies Unified Threat Management Business Growth User Tip Legislation Videos News Surveillance Managing Costs Printing Evernote Network Management CCTV Google Wallet Banking SSID Touchscreen Messenger Employer/Employee Relationships Emergency Proxy Server Deep Learning Emails Media Computer Malfunction Fake News Development Public Speaking Virtual Machine Vendor Mangement Service Level Agreement Computing Infrastructure Hosted Solution Samsung Device security Streaming Media Reviews Optimization Business Metrics Smart Technology Management Books Keyboard Teamwork Uninterrupted Power Supply Wireless Headphones 2FA Webcam Microsoft Excel Data Storage Hard Drives Hypervisor Tech Language Business Mangement Going Green Troubleshooting Society Business Cards Tablets Shopping intranet Medical IT Error Reading Shortcut SQL Server Bookmark Monitors Visible Light Communication Paperless Wireless PCI DSS Heating/Cooling Licensing Google Calendar Term Environment Download Windows 8 Supercomputer Piracy HTML Windows XP Gig Economy Humor Social Networking Supply Chain Virus Relocation Azure Browsers Displays Nanotechnology Advertising Business Communications Motion Sickness Internet Service Provider Regulations Compliance Managed IT Service Comparison Google Play Work/Life Balance Google Drive Upload Business Owner Tech Support Software License Memes Workplace Social Network Knowledge Data Analysis Corporate Profile Screen Reader Human Resources Net Neutrality Financial Data In Internet of Things Television Security Cameras Telephony Trends Employer Employee Relationship Mobile Technology Customer Resource management Network Congestion Cabling Devices Risk Management IT Hacks Scams Reliable Computing Fileless Malware Writing Tablet Google Apps G Suite Tip of the week Staffing Tracking Company Culture Telework IP Address Mouse VoIP Gamification Inbound Marketing

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?