Medusa

Social Media Users Given Cause For Panic As Passwords Stolen

Social Media Users Given Cause For Panic As Passwords Stolen

<p style&equals;"text-align&colon; justify">Popular with web users the world over&comma; social media sites have become something of a staple for all our online lives&comma; but it seems that a handful of enterprising cybercriminals have tapped into that&period; As reported by the Independent&comma; over two million passwords for social media sites belonging to users all over the world have been stolen as part of a botnet&period;<&sol;p>&NewLine;<p style&equals;"text-align&colon; justify">Using malware in the form of keylogger software&comma; the Pony botnet had managed to take passwords along with other forms of account authentication for sites including Facebook&comma; Twitter&comma; Google Plus and Yahoo&period; Research undertaken into the Botnet’s effectiveness found that many of the passwords and other data was published online&comma; revealing some rather disturbing trends in the process&period;<&sol;p>&NewLine;<h3 style&equals;"text-align&colon; justify"><strong>Widespread Theft<&sol;strong><&sol;h3>&NewLine;<p style&equals;"text-align&colon; justify">The Pony botnet’s effect was spread far and wide&period; Although over 96&percnt; of passwords and other credentials stolen came from IP addresses in the Netherlands&comma; some of the affected sites included Russian language social network vk&period;com&comma; which has millions of users&period; Such attacks do happen from time to time&comma; but it’s rare that a number as high as two million unwittingly join a botnet&period;<&sol;p>&NewLine;<p style&equals;"text-align&colon; justify"><img class&equals;"aligncenter size-full wp-image-10890" alt&equals;"Social Media Users Given Cause For Panic As Passwords Stolen" src&equals;"https&colon;&sol;&sol;medusamagazine&period;com&sol;wp-content&sol;uploads&sol;2013&sol;12&sol;Social-Media-Users-Given-Cause-For-Panic-As-Passwords-Stolen&period;jpg" width&equals;"533" height&equals;"400" &sol;><&sol;p>&NewLine;<p style&equals;"text-align&colon; justify">Pony was created in order to steal passwords and other credentials by adding different machines worldwide to it&period; Using malware&comma; it manages to ensnare a machine into the botnet&comma; allowing the operators to take passwords and the like and change them in order to prevent access by the account holder in future&period; Then&comma; the passwords are sold to other criminals who use them for their own gain&period;<&sol;p>&NewLine;<h3 style&equals;"text-align&colon; justify"><strong>Being too simple&quest;<&sol;strong><&sol;h3>&NewLine;<p style&equals;"text-align&colon; justify">Looking into the passwords stolen&comma; it seems that many of them share one common characteristic – they’re far too simple&period; Among the list&comma; common ones included &OpenCurlyQuote;password’&comma; &OpenCurlyQuote;1234’ and&comma; amazingly&comma; &OpenCurlyQuote;1’&period; The number of simple passwords stolen by Pony far outweighed the more complicated ones&comma; but there were a few which may have seemed harder to crack&period;<&sol;p>&NewLine;<p style&equals;"text-align&colon; justify">&OpenCurlyDoubleQuote;This just goes to show about the importance of endpoint security combined with a strong password&period; Even the strongest password is worthless if the endpoint it is being used on is either untrusted or trusted but insecure allowing a bonnet such as Pony to be run on it and the subsequent password key logger”&comma; commented Andrew Mason&comma; security expert for RandomStorm&period;<&sol;p>&NewLine;<p style&equals;"text-align&colon; justify">&OpenCurlyDoubleQuote;Once the key logger is installed it is very easy to harvest usernames and passwords for whatever the user types in during the course of their normal day&period; By ensuring proper endpoint security and at a minimum patching and up to date AV deployment these types of attacks can be totally eliminated&period;<&sol;p>&NewLine;<p style&equals;"text-align&colon; justify">&OpenCurlyDoubleQuote;The second area of concern from the article is the use of weak passwords&period; Again&comma; without a strong password it makes the job of a hacker so much easier being able to use an automated tool to crack many passwords per second”&comma; he added&period;<&sol;p>&NewLine;<p style&equals;"text-align&colon; justify">Using endpoint security may be the best way for people to prevent being drawn into botnets&period; For the time being&comma; social media users are being advised to amend their passwords and security settings&period;<&sol;p>&NewLine;

Exit mobile version