{"id":20528,"date":"2022-12-29T21:22:24","date_gmt":"2022-12-29T17:22:24","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/how-criminals-can-get-your-password\/20528\/"},"modified":"2022-12-29T21:22:59","modified_gmt":"2022-12-29T17:22:59","slug":"how-criminals-can-get-your-password","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/how-criminals-can-get-your-password\/20528\/","title":{"rendered":"How your password \u0441an get into the wrong hands"},"content":{"rendered":"<p>For most us, a password is simply the most common method for authentication for countless online services. But for cybercriminals, it\u2019s much more \u2014 a shortcut into someone else\u2019s life, a work tool of central importance, and merchandise that can be sold. Knowing a password, crooks not only can get hold of your accounts, data, money, and even identity; they can also use you as a weak link to attack your online friends, relatives, or even the company you work for or manage\/own. To prevent this, you need to understand how outsiders can get hold of your password in the first place.<\/p>\n<h2>How can your password fall into the hands of cybercriminals?<\/h2>\n<p>\nThere\u2019s a widespread misconception that to give your password to cybercrooks, you need to make a mistake \u2014 download and run an unchecked file from the internet, open a document from an unknown sender, or enter your credentials on some suspicious website. True, all those behavior patterns can make attackers\u2019 life much easier, but there are other scenarios as well. Here are most common cybercriminal methods of getting access to your accounts.<\/p>\n<h3>Phishing<\/h3>\n<p>\nThis is indeed one of the credential-harvesting methods that relies mostly on human error. Hundreds of phishing sites, aided by thousands of mailouts leading to them, appear daily. However, if you for some reason think that you\u2019ll never fall for the phishing trick \u2014 you\u2019re wrong. The method is almost as old as the internet itself, so cybercriminals have had plenty of time to develop numerous social engineering tricks and disguise tactics. Even professionals sometimes cannot distinguish a phishing email from a real one at a glance.<\/p>\n<h3>Malware<\/h3>\n<p>\nAnother common way of stealing your credentials is with malware. According to our statistics, a significant proportion of active malware is made up of Trojan stealers, whose main purpose is to wait until a user logs on to some site or service, and copy their passwords and send them back to their authors. If you\u2019re not using protective solutions, Trojans can hide on your computer undetected for years \u2014 you\u2019ll not know that something is wrong, because they don\u2019t cause any visible harm, just silently do their job.<\/p>\n<p>And stealer Trojans are not the only malware that hunt for passwords. Sometimes cybercriminals inject web skimmers on sites and steal anything that users input, including credentials, names, card details and so on.<\/p>\n<h3>Third party leaks<\/h3>\n<p>\nHowever, you don\u2019t have to make the same mistake yourself. It\u2019s enough to be a user of some insecure internet service or client of a company that leaked a database with its customers\u2019 data. Of course, companies that take their cybersecurity seriously don\u2019t store your passwords at all, or at least do so in encrypted form. But you never can be sure that there were sufficient measures in place. For example, this year\u2019s leak from <u>SuperVPN <\/u>contained the personal details and login credentials of 21 million users.<\/p>\n<p>Also, some companies cannot avoid storing your passwords at all. Yes, I am talking about the infamous LastPass password-management-utility hack. According to the latest information, an unknown threat actor accessed cloud-based storage with some customer data, including backups of customers\u2019 vaults. Yes, those vaults were properly encrypted, and LastPass never stored or even knew the decryption keys. But what if LastPass clients locked their vaults with a password that was already leaked from some other source? If they reused an insecure password then now cybercriminals would be able to access all their accounts at once.<\/p>\n<h3>Initial access brokers<\/h3>\n<p>\nAnd here we come to another source of stolen passwords \u2014 the black market. Modern cybercriminals prefer to specialize in certain fields. They may steal your passwords but not necessarily use them: it\u2019s more profitable to sell them wholesale. Buying such password databases is especially attractive to cybercriminals, because it gives them an all-in-one: users tend to use the same passwords across a number of platforms and accounts, often tying them all to the same email. Thus, having the password from one platform, cybercriminals can gain access to many other accounts of the victim \u2013 from their gaming accounts to their personal email or even private accounts on adult websites.<\/p>\n<div id=\"attachment_46718\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/12\/29212148\/how-criminals-may-get-your-password-gaming.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-46718\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/12\/29212148\/how-criminals-may-get-your-password-gaming.jpg\" alt=\"An advert from a hacker's forum: someone is offering 280 thousands of usernames and passwords for various game platforms for just $4,000\" width=\"1024\" height=\"468\" class=\"size-full wp-image-46718\"><\/a><p id=\"caption-attachment-46718\" class=\"wp-caption-text\">An advert from a hacker\u2019s forum: someone is offering 280 thousands of usernames and passwords for various game platforms for just $4,000<\/p><\/div>\n<p>Leaked corporate databases that may or may not contain credentials are also sold on the same black market. The price of such databases varies depending on the amount of data and the industry of the organization: some password databases may be sold for hundreds of dollars.<\/p>\n<p>There are certain services on darknet that aggregate leaked passwords and databases, and then and enable paid subscription-based or single time access to their collections. In October 2022, the infamous ransomware group LockBit <a href=\"https:\/\/www.computerweekly.com\/news\/252526099\/Advanced-Healthcare-data-was-stolen-in-LockBit-30-attack\" target=\"_blank\" rel=\"nofollow noopener\">hacked <\/a>a healthcare company, and stole their user databases with medical information. They not only sold subscriptions to this information on the darknet \u2014 presumably they bought initial access on the same black market.<\/p>\n<div id=\"attachment_46719\" style=\"width: 518px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/12\/29212203\/how-criminals-may-get-your-password-subscriptions.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-46719\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/12\/29212203\/how-criminals-may-get-your-password-subscriptions.jpg\" alt=\"A darknet services that provides paid access to databases with stolen data\" width=\"508\" height=\"464\" class=\"size-full wp-image-46719\"><\/a><p id=\"caption-attachment-46719\" class=\"wp-caption-text\">A darknet services that provides paid access to databases with stolen data<\/p><\/div>\n<h3>Brute-force attacks<\/h3>\n<p>\nIn some cases, cybercriminals don\u2019t even need a stolen database to find out your password and hack into your account. They can use brute-force attacks, in other words try thousands of typical password variants until one of them works. Yes, it doesn\u2019t sound too reliable. But they don\u2019t need to iterate over all possible combinations \u2014 there are certain tools (Wordlist Generators) that can generate a list of possible common passwords (so-called brute-force dictionaries) based on the victim\u2019s personal information.<\/p>\n<p>Such programs look like a mini questionnaire about the victim. They ask for the name, last name, date of birth, personal information about partners, children, and even pets. Attackers may even add additional keywords they know about the target that can be thrown into the mix. Using this mix of related words, names, dates, and other data, wordlist generators create thousands of password variants, that attackers later try while logging.<\/p>\n<div id=\"attachment_46717\" style=\"width: 776px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/12\/29212246\/how-criminals-may-get-your-password-dictionary.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-46717\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/12\/29212246\/how-criminals-may-get-your-password-dictionary.jpg\" alt=\"A service that can generate a dictionary for bruteforce attacks based on information known about the intended victim.  \" width=\"766\" height=\"729\" class=\"size-full wp-image-46717\"><\/a><p id=\"caption-attachment-46717\" class=\"wp-caption-text\">A service that can generate a dictionary for bruteforce attacks based on information known about the intended victim.<\/p><\/div>\n<p>To use such method, cybercriminals need to conduct research first \u2014 and this is when those leaked databases may come in handy. They may contain pieces of information such as birth dates, addresses, or answers to \u201csecret questions\u201d. Another source of the data is oversharing in social networks. Something that looks absolutely insignificant, such as a photo from Dec. 6 with the caption \u201ctoday is my beloved doggie\u2019s birthday\u201d.<\/p>\n<h2>Possible consequences of a leaked or brute-forced password<\/h2>\n<p>\nThere are some obvious consequences: cybercriminals can take over your account and hold it for ransom, use it to scam your contacts and online friends, or, if they\u2019re able to get the password to your banking site or app, empty your account. However, sometimes their intent is not so straightforward.<\/p>\n<p>For example, with more games introducing in-game currency and micro-transactions, more users have their payment methods linked to their accounts. This makes gamers an interesting target for hackers. By obtaining access to the gaming account, they can steal in-game valuables like skins, rare items or internal game currency, or misuse the victim\u2019s credit card data.<\/p>\n<p>The leaked databases and information that can be obtained while searching your accounts can be used not just for financial gain but also for reputational harm and other types of social damage, including <em>doxing<\/em>. If you\u2019re a celebrity, you can be blackmailed and face a choice: disclosure of personal information (that could affect your reputation) or loss of money.<\/p>\n<p>Even if you\u2019re not a celebrity, you can become a victim of doxing \u2014 the act of revealing identifying information about someone online \u2014 such as their real name, home address, workplace, phone, financial, and other personal information. Doxing attacks can range from the relatively harmless, such as sign-ups to countless mailing lists or fake pizza delivery orders in your name, to the far more dangerous ones, such as various forms of cyberbullying, identity theft, or even in-person stalking.<\/p>\n<p>Finally, if you\u2019re using the same password for personal and work accounts, cybercriminals can take over your corporate e-mail and use it for business e-mail compromise schemes or even targeted attacks.<\/p>\n<h2>How to protect your accounts from unwanted access<\/h2>\n<p>\nFirst of all \u2014 always keep password hygiene in mind:<\/p>\n<ul>\n<li>do not reuse the same password for several accounts;<\/li>\n<li>make your passwords long and strong;<\/li>\n<li>store them securely;<\/li>\n<li>change them immediately upon first hearing news about a data breach at the service or website that this password is used to protect.<\/li>\n<\/ul>\n<p>Our <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">password manager software<\/a> can help you with all those tasks. It is available as a part of our security solutions for <a href=\"https:\/\/me-en.kaspersky.com\/small-business-security\/small-office-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksos___\" target=\"_blank\" rel=\"noopener\">SMB's<\/a> and for <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">home clients<\/a>. <\/p>\n<p>Also, <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky application<\/a> monitors the security of all your passwords in real-time. It even has a service for checking whether a leak really occurred or not. Called Data Leak Checker, it\u2019s found under the Privacy tab. It lets you check whether your email has been spotted in a stolen database somewhere. If so, you\u2019ll receive a list of leaky sites, the type of data made public (personal, banking, online activity history and so on), as well as recommendations on what to do about it. <\/p>\n<p>And here\u2019s some additional advice:<\/p>\n<ol>\n<li>Enable two-factor authentication wherever possible. It provides an additional layer of security and will prevent hackers accessing your account \u2014 even if someone manages to obtain your login and password.<\/li>\n<li>Set up your social networks for better privacy. This will make it more difficult to find information about you, and therefore complicate use of a brute-force dictionary for attacking your accounts.<\/li>\n<li>Stop oversharing personal information, even if it\u2019s visible only to friends. Today\u2019s friend may become tomorrow\u2019s enemy.<\/li>\n<\/ol>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n","protected":false},"excerpt":{"rendered":"<p>And more importantly \u2014 how to stop your passwords from being used by cybercriminals.<\/p>\n","protected":false},"author":2723,"featured_media":20531,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917,9],"tags":[1047,2422,187,43],"class_list":{"0":"post-20528","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"category-tips","10":"tag-2fa","11":"tag-doxing","12":"tag-passwords","13":"tag-privacy"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/how-criminals-can-get-your-password\/20528\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/how-criminals-can-get-your-password\/25033\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/how-criminals-can-get-your-password\/27599\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/how-criminals-can-get-your-password\/25460\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/how-criminals-can-get-your-password\/25675\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/how-criminals-can-get-your-password\/28239\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/how-criminals-can-get-your-password\/34508\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/how-criminals-can-get-your-password\/46716\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/how-criminals-can-get-your-password\/19958\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/how-criminals-can-get-your-password\/20531\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/how-criminals-can-get-your-password\/29639\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/how-criminals-can-get-your-password\/33317\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/how-criminals-can-get-your-password\/25754\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/how-criminals-can-get-your-password\/31499\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/how-criminals-can-get-your-password\/31213\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/passwords\/","name":"passwords"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2723"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=20528"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20528\/revisions"}],"predecessor-version":[{"id":20530,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20528\/revisions\/20530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/20531"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=20528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=20528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=20528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}