Malware

Threat of the month: Credentials theft

Share

What is it?

Cyber criminals seek user credentials that will enable access to valuable systems and resources.

How does it work?

Key-logging malware captures user keystrokes during login; a phishing site is designed to look like a legitimate login page; cyber criminals hack into e-commerce websites and social networks to extract the user database, including user credentials. Since users often re-use credentials, there is a high likelihood that the same credentials can be used for logging into other systems as well.

Should I be worried?

Yes, stolen credentials enable fraudulent activity related to personal information. They are also often used for breaching corporate environments and compromising systems and operations. 

How can I prevent it?

Don't login to sensitive applications from
unprotected machines. Change passwords often and don't use the same credentials across
multiple systems.



Related Terms

Adware

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.