• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

How Do Hackers Get Passwords?


By VARINDIA - 2021-04-10
How Do Hackers Get Passwords?

In every movie with a hacker, there is always that scene where the hacker must guess the right password. A blinking cursor in the password field looms on a large computer monitor. The hacker is usually under a lot of pressure, with the seconds counting down. They make one or two wrong guesses, before finally typing the right password, and presto! They’re in. Now they can launch the missile, or stop the missile from launching, or steal all the evidence that will incriminate the crime boss.

 

From what we see in movies and pop culture, you would think that “hacking” is a matter of guessing a few passwords and instantly gaining access to something. You would also think that it’s usually a solo hacker targeting a specific person for a specific reason – perhaps because their target is a millionaire or the CIO of a large company.

 

But what you see on the big screen is pretty far from the truth about how hackers get passwords and how they use them.

 

How do hackers hack passwords?

When hackers are trying to get passwords, they don’t guess them one by one in a password field. Instead, they have a toolbox of software programs and databases to help them figure out credentials that might work.

First, most passwords that hackers have access to are stolen in large data breaches from popular online services. When popular services like LinkedIn, eBay, and Adobe have millions of records leaked, the passwords stolen in those breaches are compiled in large databases. Less well-known websites are also regularly hacked due to poor security protocols. So, what do hackers do? They use these “dumps” of data to perform “credential stuffing”, where they use software (or “bots”) to automatically test every username and password combination in the database to see if any successfully log on to another website (like a bank).

Or, if a hacker knows an email address for a user’s account, they can use “password spraying” where they test known passwords (like 12345 and asdf) to see if any work with that particular email address. Again, bots are running these tests, and only if a match is found does a hacker then use the valid credentials to try taking over the account.

According to Akamai, there are at least 280 million malicious login attempts per day, including 300,000 attempted logins per hour from a single botnet.

And let’s not forget phishing. With large databases full of email addresses, it’s very easy for hackers to send millions of emails every day. Oftentimes, these emails impersonate legitimate services, like banks, and trick people into giving away personal information. The person might click in the email and be sent to a login page that looks legitimate, but actually just harvests their credentials for the hacker to use.

How do hackers get into my computer?

It’s much less likely (though still possible) that hackers will actually hack into your computer. It’s much easier for them to use credential stuffing, password spraying, and phishing to try to find valid credentials to take over an online account.

But there are other ways hackers can try to steal your information. Sometimes phishing emails contain malicious software, or malware, either in attachments or in embedded links. By downloading the malware to their computer, people increase the likelihood of having a keylogger installed that can then capture their passwords and send it to a hacker. Or, people might download ransomware that allows hackers to extort you for money or information in order to get your data back.

If someone has access to your physical device, at home or in the office, it’s also possible someone could try logging in directly on your machine. If you have your passwords written down in an easy-to-get-to place, a hacker might not have any trouble breaking into your computer. That said, the risk is very low, and is more likely to be someone you know personally rather than a stranger.

How can I keep hackers out of my accounts?

Most of us aren’t very attractive targets for hackers – we likely aren’t millionaires, or hold high-profile corporate positions, or serve as top government officials. But, hackers love the “low-hanging fruit” – they’ll often steal what is easiest to take. That’s why credential stuffing and password spraying are so popular; they can be easily and cheaply automated so that hackers increase their chances of finding money or more data to steal that they can sell on the dark web.

Now that we’ve demystified password hacking, you’ll see that simple actions can help significantly reduce your risk of being a hacking victim.

First, don’t reuse passwords. A password manager can help you generate unique passwords for every single account (and gives you a convenient place to store them). That way, a password stolen in a data breach for one website won’t automatically give a hacker access to your other online accounts.

Second, add multifactor authentication where you can. If a hacker manages to obtain your username and password, MFA requires additional login information that the hacker is very unlikely to have access to.

Three, be aware. If a service you use tells you about a data breach, update your password. Enroll in dark web monitoring so you are aware of any data leaked online and can respond appropriately.

With just a few simple steps, you’ll drastically lower your chance of having a hacker get your passwords or hack into your computer. When you’re no longer an easy target, hackers are much more likely to give up trying to hack you. You’ll better protect your sensitive information, your finances, and your identity from theft and fraud.

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.