موسسه امنیتی Hold Security آمریکا امروز با انتشار گزارشی خبر از یکی از بزرگترین (یا شاید بزرگترین) دزدیهای اینترنتی جهان توسط هکر های روسی داد.
بنا به این گزارش که طی 18 ماه بررسی توسط متخصصین این موسسه امنیتی آمریکایی انجام شده است ، هکر های روسی موفق به سرقت 1.2 میلیارد نام کاربری و رمز عبور و همچنین 500 میلیون آدرس ایمیل شده اند.
این هکر ها بعد از پیداکردن باگ امنیتی موجود در پایگاه داده SQl سایت ها ، کنترل وب سابیت مذکور را به دست گرفته و سپس اطلاعات لازم را از بانک اطلاعاتی آن ها استخراج می کردند.
برآورد انجامشده نشان میدهد که این گروه در نهایت حدود 420 هزار وبسایت و افتیپی سایت را موردحمله و دزدی اطلاعاتی قرار داده است. جالب اینجاست که این هکرها شامل تعداد بسیار زیادی از افرادی میباشد که در سال 2011 کار خود را به شکل اسپمرهای آماتور آغاز کردهاند و سرانجام به پیشرفت امروز رسیدهاند.
دزدیها و جاسوسیهای اینترنتی اگرچه از سوی شرکتهای امنیتی به عنوان یک خطر بزرگ یاد میشود و حتی اخیرا افشاگریهای ادوارد اسنودن نیز این موضوع را بیش از گذشته مورد توجه قرار داده، اما نظرسنجیهای اینترنتی متفقالقول گویای این واقعیتاند که اغلب کاربران اینترنتی به امنیت خود حتی پس از اعلام عمومی مشکلات امنیتی توجهی ندارند.
مثال بارز آن را میتوان در نظرسنجیهای بعد از کشف رخنه هارتبلید، بزرگترین رخنه امنیتی تاریخ اینترنت پیدا کرد. در این نظرسنجیها در مجموع شاید حدود 30 تا 40 درصد از کاربران در صدد تغییر رمز اکانت های خود برآمدند. آیا کاربران اینترنتی به دزدیها و رخنههای اینترنتی خو گرفتهاند و دیگر آن را تهدیدی برای خود نمیدانند؟
منبع : mashable
Russian Hacker Group Steals 1.2 Billion Internet User Passwords
Russian Hacker Group Steals 1.2 Billion Internet User Passwords
A U.S. security firm has uncovered what appears to be the largest Internet security breach in recent memory, conducted by a group of Russia-based hackers.
According to Milwaukee-based firm Hold Security, which conducted an 18-month investigation into the breach, the online gang stole 1.2 billion username and password combos, as well as more than 500 million email addresses.
See also: How to Check If Hackers Stole Your Data in Massive Target Breach
The hackers pulled off the data heist, which ultimately scooped up 4.5 billion records, using unsuspecting systems of botnet network victims (in this case, computers with viruses that allowed a single operator to control a large group of affected systems) to test websites for SQL vulnerabilities. When a vulnerability was discovered, the hackers were then able to execute SQL injections, enabling them to send malicious commands to a website and steal its data, including usernames and passwords.
The group managed to steal information from 420,000 web and FTP sites, Hold Security said.
“Accounts are hacked and credentials are stolen every day; however, the number of credentials reportedly stolen is at a massive scale,” Eric Chiu, president of cloud company HyTrust, told Mashable. “This is a huge wake-up call to consumers and companies that attackers are going after personal and work accounts in order to impersonate our online personas.”
Hold Security’s blog post, which details the data breach, also promotes its own services. However, an independent security expert hired by The New York Times confirmed its findings.
“Your data has not necessarily been stolen from you directly,” the blog post said. “It could have been stolen from the service or goods providers to whom you entrust your personal information, from your employers, even from your friends and family.”
The Russia-based cyber gang is comprised of a dozen men in their 20s who began as amateur spammers by buying information on the online black market back in 2011, The New York Times reported. Ironically, the hacking revelation has come during the Black Hat computer-security conference in Las Vegas, which takes place from Aug. 2 to 7.
The Times said Hold Security is trying to develop an online tool to help individual users identify whether or not they were impacted by the data breach. Those who use the Internet for online banking and shopping will likely be the most troubled by the company’s report. As for businesses, they are advised to immediately run a check to see if their websites are vulnerable to SQL injections.
“If you haven’t updated your password recently, now would be the time,” Adam Kujawa, head of malware intelligence at security company Malwarebytes Labs, told Mashable. “Make sure it’s a strong password containing capital and lowercase letters, numbers and special characters. Also, don’t use the same username and password combo for every site. This is especially true for sites that have personal information like the site to your bank or credit card.”