Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security Privacy The Almighty Buck

Study Finds Hundreds of Stolen Data Dumps 58

Steve writes "SecurityFix reports that a group of researchers from Germany published a study in which they analyzed several hundred so-called 'drop zones,' i.e. anonymous collection points of illicitly collected data stolen with the help of keyloggers. 'Their findings, which drew from stolen data harvested from these drop zones between April and October 2008, were staggering: 33 gigabytes worth of purloined data from more than 170,000 victims. Included in those troves were more than 10,700 online bank account credentials, 149,000 stolen e-mail credentials, 5,682 credit card numbers, and 5,712 sets of eBay credentials. [...] Using figures from Symantec's 2007 study on the prices that these credentials can fetch at e-crime bazaars, the researchers estimate that a single cyber crook using one of these kits could make a tidy daily income. The full report [PDF] contains some more interesting details.'"
This discussion has been archived. No new comments can be posted.

Study Finds Hundreds of Stolen Data Dumps

Comments Filter:
  • by theaveng ( 1243528 ) on Friday December 19, 2008 @08:44AM (#26171485)

    I've often thought that, over the ~15 year span that I've been surfing the web, I opened-up way too many accounts. I've forgotten most of them, and yet my name and address still sits there in the databases just waiting to be hacked (or sold).

  • Sorry to say.. (Score:2, Insightful)

    by hesaigo999ca ( 786966 ) on Friday December 19, 2008 @12:12PM (#26173513) Homepage Journal

    Is it just me, or does this seem pretty sad, that so many of today's so called security companies, don't bother to contact the victims of this to at least tell them "Hey you might want to change your password to your online banking, someone stole it, or etc..."

    I am dissapointed by our leading security community, for leaving these "dumps" in the open to review them, yes after a few days or weeks of activity, ...ok, but then afterwards, contact the victims and let them know they have been compromised.

    When do they hear about it, ...never???

  • by saintsfan ( 1171797 ) on Friday December 19, 2008 @12:43PM (#26173869)
    job well done. They realized that the crooks stealing information from average computer users - novice, gullible and/or unconcerned - are just as susceptible themselves. Bugs in the exploiting software, misconfigured servers, and unsophisticated application programming logic can be used against them. The drop sites can be identified and apparently often times compromised, there is weakness in the system. But not just any system, a systemic international problem of organized crime (at times loosely) that threatens the financial and private information of average citizens, institutions and critical information systems. Now, why is it that researchers from a university are apparently more capable of identifying, evaluating, and investigating these risks then the many government organizations and private institutions tasked with these responsibilities? know where a drop zone is? shut it down. know who downloaded the information? Arrest them. identify the communication patterns of the trojans? scrub them. you don't know these things? change your tactics and pay attention.

The one day you'd sell your soul for something, souls are a glut.

Working...