People have been aware of only a brief area of the internet they use, and even that tiny virtual world entices them a lot.
Little wonder, the majority of the people aren’t even informed about the dark web.
The dark web is where some secretive and illegitimate work is done. And this time, highbrows of the dark web hacked over half a million accounts and sold them for peanuts. They’ve sold all the snaffled stuff really cheap.
They had a bucket full of things they proffered. At the rim of their bucket were passwords, meeting URLs and email addresses and so on and so forth. They got this ton of stuff so conveniently and then they sold it at a rock-bottom price.
All this information was possessed through credential stuff. The data that had been leaked in earlier breaches gets used to unlock more information. That’s the tool most hackers operating from the dark web use. That’s basically their modus operandi.
On the 1st of April, the cybersecurity firm observed an influx of zoom accounts that were available for purchase and could be bought for $0.0002 each. There were some more merciful hackers who put their stuff out on sale with no charges applicable to it.
These zoom credentials also included passwords along with host keys that could possibly permit them into entering meetings. These host keys also have the tendency to bring about zoom booming attacks at a wide scale.
The cyber security company Cyble was the one to discover this forum on which these credentials were being sold in the first place. As the number of heinous activities on this forum kept on increasing, this infamous forum got more and more popular among hackers.
The data these hackers steal once — it doesn’t get deleted after one use. They keep it safe for potential use in future. This is what they exactly did in this case. They used the previously obtained data to access more information and hack a plethora of accounts.