• About
  • Disclaimer
  • Privacy Policy
  • Contact
Friday, June 6, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Cyber Security

You Cannot Belief Hackers, and Different Knowledge Breach Verification Tales

Md Sazzad Hossain by Md Sazzad Hossain
0
You Cannot Belief Hackers, and Different Knowledge Breach Verification Tales
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter

You might also like

Troy Hunt: Weekly Replace 454

Prime US cyber officers face divergent paths after Senate affirmation

Pakistan Arrests 21 in ‘Heartsender’ Malware Service – Krebs on Safety


It is arduous to discover a good prison nowadays. I imply a very reliable one you might be assured will not lead you up the backyard path with false guarantees of information breaches. Like this man yesterday:

For my worldwide pals, JB Hello-Fi is a large electronics retailer down below they usually have my knowledge! I imply by design as a result of I’ve purchased a bunch of stuff from them, so I used to be curious not nearly my very own knowledge however as a result of a breach of 12 million plus individuals can be huge in a rustic of not way more than double that. So, I dropped the man a message and requested if he’d be keen to assist me confirm the incident by sharing my very own document. I did not wish to publish any public commentary about this incident till I had an inexpensive diploma of confidence it was legit, not given how a lot impression it may have in my very personal yard.

Now, I would not usually share a personal dialog with one other get together, however when somebody units out to rip-off individuals, that rule goes out the window so far as I am involved. So here is the place the dialog acquired fascinating:

He assured it for me! Sounds legit. However hey, everybody will get the good thing about the doubt till confirmed in any other case, so I began wanting on the knowledge. It seems my very own information wasn’t within the full set, however he was comfortable to supply a number of thousand pattern data with 14 columns:

  1. customer_id_
  2. first_name
  3. last_name
  4. FullName
  5. gender
  6. email_address_
  7. mobile_country_
  8. mobile_number_
  9. dob
  10. postal_street_1_
  11. state_
  12. postal_code_
  13. city_
  14. account_status

Fairly commonplace stuff, might be legit, let’s examine. I’ve slightly Powershell script I run towards the HIBP API when a brand new alleged breach is available in and I wish to get a very good sense of how distinctive it’s. It merely loops by all the e-mail addresses in a file, checks which breaches they have been in and retains observe of the proportion which have been seen earlier than. A singular breach could have anyplace from about 40% to 80% beforehand seen addresses, however this one had, nicely, extra:

Spot the development? Each single tackle has one breach in widespread. Hmmm… marvel what the man has to say about that?

However he was within the server! And he grabbed it from the dashboard of Shopify! Have to be legit, except… what if I in contrast it to the precise full breach of Dymocks? That is an area Aussie bookseller (so it might have a number of Aussie-looking electronic mail addresses in it, identical to JB Hello-Fi would), and their breach dated again to mid-2023. I preserve breaches like that readily available for simply such events, let’s evaluate the 2:

Wow! What are the probabilities?! He will be so when he hears about this!

And that was it. The chat went silent and really shortly after, the itemizing was gone:

It appears to be like just like the bloke has additionally since been booted off the discussion board the place he tried to run the rip-off so yeah, this one did not work out nice for him. That $16k would have been so tasty too!

I wrote this quick publish to focus on how vital verification of information breach claims is. Clearly, I’ve seen hundreds of reliable ones however I’ve additionally seen a number of garbage. Not normally this blatant the place the get together contacting me is making such demonstrably false claims about their very own exploits, however very frequently from individuals who get hold of one thing from one other get together and repeat the lie they have been advised. This instance additionally highlights how helpful knowledge from earlier breaches is, even after the e-mail addresses have been extracted and loaded into HIBP. Knowledge is so typically recycled and shipped round as one thing new, this was only a textbook excellent case of constructing use of a earlier incident to disprove a brand new declare. Plus, it is kinda enjoyable poking holes in a scamming prison’s claims 😊

Safety
Tags: BreachDataHackersTalesTrustVerification
Previous Post

Fantasy-Busting Assurance: System-Centric vs. Service-Centric and Why Each Are Key

Next Post

6 Important Winter Preparedness Checks for Utah Properties & Companies

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

Troy Hunt: Weekly Replace 454
Cyber Security

Troy Hunt: Weekly Replace 454

by Md Sazzad Hossain
June 6, 2025
Prime US cyber officers face divergent paths after Senate affirmation
Cyber Security

Prime US cyber officers face divergent paths after Senate affirmation

by Md Sazzad Hossain
June 5, 2025
Pakistan Arrests 21 in ‘Heartsender’ Malware Service – Krebs on Safety
Cyber Security

Pakistan Arrests 21 in ‘Heartsender’ Malware Service – Krebs on Safety

by Md Sazzad Hossain
June 5, 2025
An AI makes use of blackmail to save lots of itself, and threats make AIs work higher • Graham Cluley
Cyber Security

An AI makes use of blackmail to save lots of itself, and threats make AIs work higher • Graham Cluley

by Md Sazzad Hossain
June 4, 2025
Faux DocuSign, Gitcode Websites Unfold NetSupport RAT through Multi-Stage PowerShell Assault
Cyber Security

Faux DocuSign, Gitcode Websites Unfold NetSupport RAT through Multi-Stage PowerShell Assault

by Md Sazzad Hossain
June 4, 2025
Next Post
6 Important Winter Preparedness Checks for Utah Properties & Companies

6 Important Winter Preparedness Checks for Utah Properties & Companies

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Detailed Comparability » Community Interview

Detailed Comparability » Community Interview

May 9, 2025
Digital DPO vs. On-Website DPO

Digital DPO vs. On-Website DPO

February 14, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

Enhancing LinkedIn Advert Methods with Knowledge Analytics

Enhancing LinkedIn Advert Methods with Knowledge Analytics

June 6, 2025
The Newest 6G Analysis from VIAVI and Companions at IEEE ICC 2025

The Newest 6G Analysis from VIAVI and Companions at IEEE ICC 2025

June 6, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In