Hackers get hacked by infostealing malware

A white padlock on a dark digital background.
(Image credit: Shutterstock.com)

Although not as common of an occurrence, hackers will sometimes breach other hackers’ devices and steal their login credentials. 

In a recent report, cybersecurity researchers from Hudson Rock said they found some 120,000 infected systems, with 100,000 belonging to hackers. From those compromised endpoints, more than 140,000 login credentials to various hacking forums were stolen.

Hudson Rock compiled the information after sifting through 100 cybercrime forums, going through information from publicly available leaks, and analyzing infostealer malware logs sourced directly from the attackers.

Promoting fake cracks

“Hackers around the world infect computers opportunistically by promoting results for fake software or through YouTube tutorials directing victims to download infected software,” Alon Gal, chief technology officer at Hudson Rock, told BleepingComputer.

The researchers then managed to use this data to expose the users’ real identities. By looking at data from infostealer logs, the researchers discovered credentials for additional services, autofill data which often included personally identifiable information, and system information.

Hudson Rock’s experts also found that the majority of hackers had very good password practices, but some were quite sloppy, too. Generally speaking, the passwords to log into hacking forums were stronger than those for government websites, with 40% of those for BreachForums being at least 10 characters long and containing four types of characters. 

Almost 60,000 of compromised accounts were for the Nulled community. 

The researchers are saying that the way hackers get their computers infected does not differ from the way average users do. Hackers use social media to promote fake software, cracks and key generators which other hackers (probably of lower skill) download. 

Those that had weak passwords (for example, a string of consecutive numbers) were most likely not that interested in participating in the hacking community, the researchers speculate. These accounts were probably just used to keep tabs on the community, keep up with the discussions, or check if any important database goes on sale. 

Via: BleepingComputer

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Cartoon Phishing
Over a billion credentials stolen were stolen in malware attacks in 2024
ransomware avast
Billions of credentials were stolen from businesses around the world in 2024
ransomware avast
AI is helping hackers get access to systems quicker than ever before
An American flag flying outside the US Capitol building against a blue sky
US military and defense contractors hit with Infostealer malware
A digital representation of a lock
Gen Z and Millennial social media accounts are ripe for the taking and this doesn’t surprise me
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
Microsoft Teams and other Windows tools hijacked to hack corporate networks
Latest in Pro
cybersecurity
What's the right type of web hosting for me?
Security padlock and circuit board to protect data
Trust in digital services around the world sees a massive drop as security worries continue
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
construction
Building in the digital age: why construction’s future depends on scaling jobsite intelligence
Latest in News
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras