Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Security Discussions
40+ Passwords Found in Data Breach - Help Me Understand What Actually Happened
Message
<blockquote data-quote="bazang" data-source="post: 1123551" data-attributes="member: 114717"><p>Hudson Rock's website provides that same message for every user name.</p><p></p><p>Hudson Rock is an "aggregator" of data and, unless your user name that you entered is absolutely unique, the website free feature provides an aggregated, generic tally of data and the generic "infected by an infostealer" is not necessarily accurate. It is also the same with compromised passwords - HudsonRock is aggregating the data that it scrapes and presenting it to you in an un-differentiated form.</p><p></p><p>Try entering "<a href="mailto:william@gmail.com">william@gmail.com</a>" on the Hudson Rock website. 1,337+ "services" infected. That is because people all over the world use the username "<a href="mailto:william@gmail.com">william@gmail.com</a>" without even having a "<a href="mailto:william@gmail.com">william@gmail.com</a>" account, and those systems have been compromised in one way or another. There's other reasons too for the large "infected" numbers.</p><p></p><p>[ATTACH]288204[/ATTACH]</p><p></p><p>To be more sure, you need the Hudson Rock report that lists your specific device name (at the time of infection) and your exact public IP address. (You can try the "Hudson Rock Free Report" option at the top of the page.)</p><p></p><p>Enter your public IP address into HudsonRock's free online tools instead of your username. You will still receive an "aggregated" set of numbers of data collected across many, many data sources.</p><p></p><p>You need the Summary of Infections report (example):</p><p></p><p>[URL unfurl="true"]https://www.infostealers.com/article/hudson-rock-announces-first-comprehensive-infostealer-intelligence-ai-bot-cavaliergpt/[/URL]</p><p></p><p>It is wrong to conclude that whatever happened to your devices was due to a data breach. That is just a very imprecise guess. There is insufficient infos to make that determination. The only definitive, accurate answer can be determined by a forensic investigation of both the devices and cloud resources.</p><p></p><p>If it was a data breach, you don't know where the breach occurred, and therefore you need to close every single one of your online accounts and open new ones. Just changing logon credentials can be "not adequate." At the very least you should report that you think your data has been compromised and report it to every single online account that is valuable to you.</p></blockquote><p></p>
[QUOTE="bazang, post: 1123551, member: 114717"] Hudson Rock's website provides that same message for every user name. Hudson Rock is an "aggregator" of data and, unless your user name that you entered is absolutely unique, the website free feature provides an aggregated, generic tally of data and the generic "infected by an infostealer" is not necessarily accurate. It is also the same with compromised passwords - HudsonRock is aggregating the data that it scrapes and presenting it to you in an un-differentiated form. Try entering "[EMAIL]william@gmail.com[/EMAIL]" on the Hudson Rock website. 1,337+ "services" infected. That is because people all over the world use the username "[EMAIL]william@gmail.com[/EMAIL]" without even having a "[EMAIL]william@gmail.com[/EMAIL]" account, and those systems have been compromised in one way or another. There's other reasons too for the large "infected" numbers. [ATTACH alt="1745335561617.png"]288204[/ATTACH] To be more sure, you need the Hudson Rock report that lists your specific device name (at the time of infection) and your exact public IP address. (You can try the "Hudson Rock Free Report" option at the top of the page.) Enter your public IP address into HudsonRock's free online tools instead of your username. You will still receive an "aggregated" set of numbers of data collected across many, many data sources. You need the Summary of Infections report (example): [URL unfurl="true"]https://www.infostealers.com/article/hudson-rock-announces-first-comprehensive-infostealer-intelligence-ai-bot-cavaliergpt/[/URL] It is wrong to conclude that whatever happened to your devices was due to a data breach. That is just a very imprecise guess. There is insufficient infos to make that determination. The only definitive, accurate answer can be determined by a forensic investigation of both the devices and cloud resources. If it was a data breach, you don't know where the breach occurred, and therefore you need to close every single one of your online accounts and open new ones. Just changing logon credentials can be "not adequate." At the very least you should report that you think your data has been compromised and report it to every single online account that is valuable to you. [/QUOTE]
Insert quotes…
Verification
Post reply
Top