"Phishing" an attempt used by hackers to hijack accounts


Photo credits: designer491

A research suggests, Cyber-thieves grab almost 250,000 valid log-in names and passwords for Google accounts every week.

The study by Google and UC Berkeley looked at the ways email and other accounts get hijacked.

It used 12 months of log-in and account data found on websites and criminal forums or which had been harvested by hacking tools.

Google said the research helped secure accounts by showing how people fell victim to scammers and hackers.

During the 12 months studying the underground markets, the researchers identified more than 788,000 credentials stolen via keyloggers, 12 million grabbed via phishing and 1.9 billion from breaches at other companies.

Phishing involves attempts to trick people into handing over personal information and keyloggers are programs that record every key someone presses when using a computer.

The most useful information for cyber-thieves came from keyloggers and phishing attacks as these included valid passwords in 12%-25% of attacks, it found.

Phishing attacks posed the biggest risk to users as these helped malicious hackers scoop up about 234,000 valid names and passwords every week. By contrast, keyloggers only yielded about 15,000 valid credentials each week.

According to the researcher, Cyber-attackers also sought to grab other information that could be useful in attacks.

Data about a person's internet address (IP) as well as the device they were using and their physical location were all potentially useful for attackers seeking to defeat security checks.

Popular passwords found in data breaches

    * 123456
    * password
    * 123456789
    * abc123
    * password1
    * 111111
    * qwerty
    * 12345678
    * 1234567

Gathering this data was much harder, found the research, with only 3.8% of people who had credentials leaked also giving away IP addresses and fewer than 0.001% surrendering detailed device information.

However, users should be educated on quality use of the internet and better ways to protect sensitive information.

Source: BBC

Comments

Popular posts from this blog

Chromium,it's health benefits

StartZone partners bramo digi on social good summit

Chinese man arrested over US cyber attacks

Nokia Aim to Integrate CEM Technology For MTN Nigeria

Etihad, Alibaba, Ant partner on customer experience

Thomas Cook relaunch flights to Tunisia - two years after beach terror attack

Simple Ways To Prepare Nkwobi

Switzerland landslide: some scientists are now warning

Hurricane Harvey bears down on Texas

Glitter iPhone cases recalled over chemical burn risk