Why leaks no longer work with Email providers ?!? 06-04-2018, 12:25 PM
#1
This past two to three years have been the golden age of leaks. A hacker or cracker just need to purchase or download a database, solve the hashed passwords and you have access to the email. As the time goes by a lot of users become aware of this method, which basically is if you can't hack directly the email then use less secure services to obtain a possible password combination.
With the exposure of this underground method people become more aware about re-use the same password across multiple services. The consequences for this are now visible.
1) If you download a database and try to send spam or marketing emails to them, in most cases they will be rejected and a stop sign will show up in the email not delivered message.
2) The biggest email providers now alerts the users when an attempt to gain unauthorized access to the account has happen. This means if anyone tries to login to a "Gmail" "Hotmail" "etc" using a diferent OS, browser, country or ip it will raise a warning sign.
As more and more people know about this the more restrictive rules are set, so, this only means that the good times of email hacking using leaks are over and new methods will have to surface. Nevertheless this doesn't mean that old methods of hacking are obsolute, for example RAT infection will still make it possible to hack a email if the hacker use remote desktop and login to the email using the same system or just setting up the RAT as a proxy in the background and access the email from the proxy.
Nowadays leaks are only good to access other complementary services associated with the email for example cloud storage in case the user uses the same password in diferent services. It will be possible to crack a mega.nz account for example.
We need new methods, until then Happy Hacking!
With the exposure of this underground method people become more aware about re-use the same password across multiple services. The consequences for this are now visible.
1) If you download a database and try to send spam or marketing emails to them, in most cases they will be rejected and a stop sign will show up in the email not delivered message.
2) The biggest email providers now alerts the users when an attempt to gain unauthorized access to the account has happen. This means if anyone tries to login to a "Gmail" "Hotmail" "etc" using a diferent OS, browser, country or ip it will raise a warning sign.
As more and more people know about this the more restrictive rules are set, so, this only means that the good times of email hacking using leaks are over and new methods will have to surface. Nevertheless this doesn't mean that old methods of hacking are obsolute, for example RAT infection will still make it possible to hack a email if the hacker use remote desktop and login to the email using the same system or just setting up the RAT as a proxy in the background and access the email from the proxy.
Nowadays leaks are only good to access other complementary services associated with the email for example cloud storage in case the user uses the same password in diferent services. It will be possible to crack a mega.nz account for example.
We need new methods, until then Happy Hacking!