Massive Hacking has stolen Two Million Passwords of Facebook, Gmail and Twitter
If you are a regular user of either of these (Facebook/Twitter/Gmail) social network sites, it may be a prudent idea to change your respective password immediately.
The report that is being released this week, has bought an up a breathtaking news. The hackers have stolen the password and user names of 2 Million Facebook and Gmail accounts along with twiter..
Now the following facts are the Scary Truth of Hacking ....
Account Details
Accounts
| Have Been Hacked
| |
---|---|---|
Facebook
| 318,000
| |
Yahoo
| 59,500
| |
Gmail and Google+
| 70,500
| |
LinkedIn
| 8,500
| |
Twitter
| 21,700
|
The Pony Bonet
A Bonet is a robot network, which infects the computers and bug them to a server (Hacking Server). After the infections happened , the computers are called Zombies.
At once ten thousand of Zombies are controlled remotely.Then the hackers send spam or crash the computer.
Installation of a Key Logging software:
After the bonnet infects, the Massive Break out was done with the help of cruelty installation of a Key Logging software. Thea Logging Software use to steal details of login. It was being installed on a number of machines around the world. The process came into an eye when the cyber security firm ‘Trustwave’ dogged it. These dangerous viruses were capturing all the sensitive loggings since past few months and were sent to the server controller by the hackers. Those credentials were used for some online websites.
Research Result of Trustwave
Trustwave researcher tracked those servers which were located in Netherland, on Nov 24. They discovered that the acquired Credentials were being used for more than 93 thousand websites. Among them, a few of the websites were Facebook, LinkedIn, Twitter, ADP and Yahoo etc. It was told that the passwords were changed by the server controller of the website for compromised use. When asked Google about this, they decline to make any comment on this.
Massive Hacking
Unawareness of such Virus
Miller opened and said that they were unaware of such virus and they were not sure how this virus affected the personal computers. Through Proxy server, the hackers routed the personal information by setting up the key logging software . This made in a successful task to the hacker because it was impossible to track which computer is being affected or is going to get affected.
The hacking task was started on Oct 21. This is when they started collecting secret information. Even if the Virus is been detected, there are a few similar servers which are not yet tracked. No one knows how many servers are there now, but soon they will also get tracked.
© 2013 M K Paul