Print 15 comment(s) - last by Beenthere.. on Dec 29 at 10:29 AM

  (Source: Digital Trends)
Identity Finder LLC has released an analysis of the information obtained and posted by hacking group Anonymous after it attacked Stratfor

A new study has found specific details concerning Anonymous' recent successful hack on the intelligence company Stratfor, such as the number of credit card numbers obtained.

Identity Finder LLC, a technology security company that finds and protects sensitive data, has released an analysis of the information obtained and posted by hacking group Anonymous after it attacked Stratfor. So far, Anonymous has posted information regarding Stratfor subscribers with first names beginning with A through M, and it is assumed that those beginning with N through Z will be posted later.

According to the analysis, 50,277 unique credit card numbers were in the files posted by Anonymous, where 9,651 have not expired yet. The analysis also noted 86,594 email addresses, where 47,680 are unique; 27,537 phone numbers, where 25,680 are unique; 44,188 encrypted passwords, where 50 percent could have easily been cracked, and 13,973 U.S. addresses.

Password strength was noted as an important issue, where 73.7 percent of decrypted passwords were weak, 21.7 percent were of medium strength, and only 4.6 percent were strong. About 10 percent of decrypted passwords were less than five characters long, while only 4.8 percent were 10 or more characters long.

“This is the latest data leak by ‘breachers’ who not only hack into corporations but also breach their data privacy by posting the information online,” said Aaron Titus, Identity Finder’s Privacy Officer.
“Unfortunately this problem will only get worse unless corporations minimize their data footprint and shrink their data target. The number of posted passwords and the threat of password re-use is significant. Passwords are a digital identity and password reuse is a serious problem that could lead toward identity fraud. The victims will have no way to know when an identity thief is reusing their email and password combination to attempt to log into their online bank, an online retailer where they have saved their credit card for future purchases, or other online accounts such as e-mail."

In addition to posting names beginning with N through Z next, Anonymous claims to have copied 2.7 million emails which will be posted next.

Source: Identity Finder

Comments     Threshold

This article is over a month old, voting and posting comments is disabled

RE: cloud at its best broken for users
By michaelklachko on 12/28/2011 1:55:06 PM , Rating: 1
Web based email (Gmail, Yahoo, etc) is an example of cloud computing "for consumers".
Are you suggesting we all run our own mail servers at home?

RE: cloud at its best broken for users
By NellyFromMA on 12/28/2011 1:57:50 PM , Rating: 2
Why would he be suggesting that.... e-mail has been server based since the beginning of the 80s (at least!) When cloud computing wasn't even terminology worth anything.

Internet -or- network != cloud....

RE: cloud at its best broken for users
By michaelklachko on 12/28/2011 2:12:16 PM , Rating: 3
email has been server based

Lol. Do you think "cloud" is unicorn based?
What do you think Gmail service is running on?

By Mitch101 on 12/29/2011 10:02:54 AM , Rating: 2
Yea Unicorns and Rainbows are what Apple uses!

RE: cloud at its best broken for users
By KentState on 12/28/2011 3:59:09 PM , Rating: 2
Unless someone is logging in directly to my personal email server and the mail does not hit the internet, then it's pretty much cloud based. Cloud is just a fancy name that companies put on services that work like email. We just now have enough bandwidth to host a lot more services like databases in the "cloud".

RE: cloud at its best broken for users
By michaelklachko on 12/28/2011 4:47:11 PM , Rating: 2
A cloud does not have to live on the internet. I can have my own private cloud, and I can let people directly connect to it - either to use some service I provide (PaaS/SaaS), or to rent my servers (IaaS).
Therefore, it can totally bypass public internet, and still be called "cloud".

By Mitch101 on 12/29/2011 10:04:40 AM , Rating: 2
I have a cloud in my Bathroom. White Cloud to be specific and its not for public use.

"So, I think the same thing of the music industry. They can't say that they're losing money, you know what I'm saying. They just probably don't have the same surplus that they had." -- Wu-Tang Clan founder RZA

Most Popular Articles5 Cases for iPhone 7 and 7 iPhone Plus
September 18, 2016, 10:08 AM
Laptop or Tablet - Which Do You Prefer?
September 20, 2016, 6:32 AM
Update: Samsung Exchange Program Now in Progress
September 20, 2016, 5:30 AM
Smartphone Screen Protectors – What To Look For
September 21, 2016, 9:33 AM
Walmart may get "Robot Shopping Carts?"
September 17, 2016, 6:01 AM

Copyright 2016 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki