• About
  • Disclaimer
  • Privacy Policy
  • Contact
Sunday, June 15, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Cyber Security

You Cannot Belief Hackers, and Different Knowledge Breach Verification Tales

Md Sazzad Hossain by Md Sazzad Hossain
0
You Cannot Belief Hackers, and Different Knowledge Breach Verification Tales
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter

You might also like

Dutch police determine customers as younger as 11-year-old on Cracked.io hacking discussion board

Discord Invite Hyperlink Hijacking Delivers AsyncRAT and Skuld Stealer Concentrating on Crypto Wallets

Why Each Enterprise Wants a Regulatory & Compliance Lawyer—and the Proper IT Infrastructure to Assist Them


It is arduous to discover a good prison nowadays. I imply a very reliable one you might be assured will not lead you up the backyard path with false guarantees of information breaches. Like this man yesterday:

For my worldwide pals, JB Hello-Fi is a large electronics retailer down below they usually have my knowledge! I imply by design as a result of I’ve purchased a bunch of stuff from them, so I used to be curious not nearly my very own knowledge however as a result of a breach of 12 million plus individuals can be huge in a rustic of not way more than double that. So, I dropped the man a message and requested if he’d be keen to assist me confirm the incident by sharing my very own document. I did not wish to publish any public commentary about this incident till I had an inexpensive diploma of confidence it was legit, not given how a lot impression it may have in my very personal yard.

Now, I would not usually share a personal dialog with one other get together, however when somebody units out to rip-off individuals, that rule goes out the window so far as I am involved. So here is the place the dialog acquired fascinating:

He assured it for me! Sounds legit. However hey, everybody will get the good thing about the doubt till confirmed in any other case, so I began wanting on the knowledge. It seems my very own information wasn’t within the full set, however he was comfortable to supply a number of thousand pattern data with 14 columns:

  1. customer_id_
  2. first_name
  3. last_name
  4. FullName
  5. gender
  6. email_address_
  7. mobile_country_
  8. mobile_number_
  9. dob
  10. postal_street_1_
  11. state_
  12. postal_code_
  13. city_
  14. account_status

Fairly commonplace stuff, might be legit, let’s examine. I’ve slightly Powershell script I run towards the HIBP API when a brand new alleged breach is available in and I wish to get a very good sense of how distinctive it’s. It merely loops by all the e-mail addresses in a file, checks which breaches they have been in and retains observe of the proportion which have been seen earlier than. A singular breach could have anyplace from about 40% to 80% beforehand seen addresses, however this one had, nicely, extra:

Spot the development? Each single tackle has one breach in widespread. Hmmm… marvel what the man has to say about that?

However he was within the server! And he grabbed it from the dashboard of Shopify! Have to be legit, except… what if I in contrast it to the precise full breach of Dymocks? That is an area Aussie bookseller (so it might have a number of Aussie-looking electronic mail addresses in it, identical to JB Hello-Fi would), and their breach dated again to mid-2023. I preserve breaches like that readily available for simply such events, let’s evaluate the 2:

Wow! What are the probabilities?! He will be so when he hears about this!

And that was it. The chat went silent and really shortly after, the itemizing was gone:

It appears to be like just like the bloke has additionally since been booted off the discussion board the place he tried to run the rip-off so yeah, this one did not work out nice for him. That $16k would have been so tasty too!

I wrote this quick publish to focus on how vital verification of information breach claims is. Clearly, I’ve seen hundreds of reliable ones however I’ve additionally seen a number of garbage. Not normally this blatant the place the get together contacting me is making such demonstrably false claims about their very own exploits, however very frequently from individuals who get hold of one thing from one other get together and repeat the lie they have been advised. This instance additionally highlights how helpful knowledge from earlier breaches is, even after the e-mail addresses have been extracted and loaded into HIBP. Knowledge is so typically recycled and shipped round as one thing new, this was only a textbook excellent case of constructing use of a earlier incident to disprove a brand new declare. Plus, it is kinda enjoyable poking holes in a scamming prison’s claims 😊

Safety
Tags: BreachDataHackersTalesTrustVerification
Previous Post

Fantasy-Busting Assurance: System-Centric vs. Service-Centric and Why Each Are Key

Next Post

6 Important Winter Preparedness Checks for Utah Properties & Companies

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

Dutch police determine customers as younger as 11-year-old on Cracked.io hacking discussion board
Cyber Security

Dutch police determine customers as younger as 11-year-old on Cracked.io hacking discussion board

by Md Sazzad Hossain
June 15, 2025
Discord Invite Hyperlink Hijacking Delivers AsyncRAT and Skuld Stealer Concentrating on Crypto Wallets
Cyber Security

Discord Invite Hyperlink Hijacking Delivers AsyncRAT and Skuld Stealer Concentrating on Crypto Wallets

by Md Sazzad Hossain
June 14, 2025
The Carruth Knowledge Breach: What Oregon Faculty Staff Must Know
Cyber Security

Why Each Enterprise Wants a Regulatory & Compliance Lawyer—and the Proper IT Infrastructure to Assist Them

by Md Sazzad Hossain
June 14, 2025
Detecting Ransomware on Community: How Community Site visitors Evaluation Helps
Cyber Security

Detecting Ransomware on Community: How Community Site visitors Evaluation Helps

by Md Sazzad Hossain
June 13, 2025
What’s Zero Belief Structure? A Newbie’s Information
Cyber Security

What’s Zero Belief Structure? A Newbie’s Information

by Md Sazzad Hossain
June 13, 2025
Next Post
6 Important Winter Preparedness Checks for Utah Properties & Companies

6 Important Winter Preparedness Checks for Utah Properties & Companies

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

SoundHound AI Named a Market Chief for AIOps by ISG Analysis

SoundHound AI Named a Market Chief for AIOps by ISG Analysis

April 16, 2025
Insurcomm Continues Enlargement With New Workplace Opening in Foxborough, Massachusetts

Insurcomm Continues Enlargement With New Workplace Opening in Foxborough, Massachusetts

February 27, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

Predicting Insurance coverage Prices with Linear Regression

Predicting Insurance coverage Prices with Linear Regression

June 15, 2025
Detailed Comparability » Community Interview

Detailed Comparability » Community Interview

June 15, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In