1/11/2024 0 Comments Linkedin data breach 2016![]() A VPN is a way to securely connect into a remote network. So, the hacker set out to figure how exactly do some engineers get remote access into the network? He concluded they must be getting in through a VPN. That is, they didn’t have to be physically in the office in order to access the database or other critical systems. I mean, today it’s obvious that a lot of companies have remote employees but back in 2012 there were LinkedIn employees who had remote access into the network. He knew that engineers at LinkedIn had access to the corporate network when they were remote. So, the hacker would have to find another way in. They did all that the front doors of LinkedIn’s network was airtight. Of course, they’ll be running state-of-the-art monitoring tools and antivirus tools to watch for any intrusions. Then they’ll conduct security audits on all the internet-facing systems to make sure there’s no security holes. They would certainly be following all the latest best practices for securing a network by doing things like securing the front door to the network by putting a big firewall up to block all non-critical traffic from coming in and inspecting it for malicious activity. In 2012, a person wanted to hack into LinkedIn and get as much user data as they could, but how are you going to get into the network of LinkedIn? This is a major Silicon Valley company made by some really skilled engineers and administrators. You can use the site to look for jobs and connect with other professionals in your field. You pretty much start your account by posting your resume of where you worked and what you did there. JACK: I’m sure you all know what LinkedIn is, right? It’s the social network for professionals. (INTRO): These are true stories from the dark side of the internet. It’s never about the data breach itself but what happens to that data after its stolen. It’s just fascinating for me to think about that sometimes. They’re typically promoting someone else’s business a porn website or a pharmacy. But of course, the spammer isn’t selling anything themselves. Okay, but then what does the buyer do with this database dump? Well, if it’s full of e-mail addresses, they might use it to send spam to people. Now it’s on them to find someone.īut when the broker finds a buyer, sometimes one side doesn’t trust the other so they bring in a trusted third party, an underground escrow agent if you will, who will wait for both the cash and the database and then make the trade. ![]() So you might go to one of these brokers, offer a percentage for selling the database to someone. But before we even get to the buyer of stolen data, there’s sometimes brokers involved, people who have negotiated deals between hackers and buyers. Well, next he’ll typically want to sell that data to make some money and do it again, so now you’ve got to find a buyer. So, let’s say a hacker breaks into a place and steals a bunch of information from some company. JACK: You ever get fascinated with the cyber-crime supply chain? It’s never a solo hacker doing the whole thing there’s a lot of layers to this onion. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |