250,000 Google login names and passwords are hijacked a week

Google research reveals how and why these hijacks happen

passwords

Google teamed up with UC Berkeley in order to research how emails and other accounts are hacked. By tracking black markets, the research was able to provide a better understanding on how accounts are hijacked, and also found ways for people to secure and protect their accounts.

Over the course of 12 months, the study analysed how hackers steal important information. It found that 788,000 credentials were stolen by keyloggers, which records the keys someone presses on a keyboard. Another 12 million credentials were stolen stolen through phishing, or tricking people into giving their personal data away, and 3.3 billion credentials were exposed by third-party breaches.

Phishing was revealed to pose the biggest threat as the cyber crime technique was able to obtain 234,000 names and passwords every week. While less than phishing, keyloggers were still able to successfully steal 5,000 credentials per week, according to the research.

The research also warned that passwords are not the only thing these attacks are after. In fact, 74% of keyloggers and 82% of phishing attempts tried to collect user's IP address and location.

To prevent these types of attacks, Google suggests users have recovery information linked to their account and to use the automatically generated passwords through Chrome, keeping them safe in Smart Lock.

"While we have already applied these insights to our existing protections, our findings are yet another reminder that we must continuously evolve our defenses in order to stay ahead of these bad actors and keep users safe" the Google Security Blog states.

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

What is cloud-to-cloud backup?
cloud backup

What is cloud-to-cloud backup?

1 Mar 2021
Lazarus APT hacking group is targeting the defense industry
Security

Lazarus APT hacking group is targeting the defense industry

26 Feb 2021
Microsoft open sources CodeQL queries used in Solorigate inquiry
Security

Microsoft open sources CodeQL queries used in Solorigate inquiry

26 Feb 2021
CISA warns of ongoing Accellion File Transfer Appliance attacks
hacking

CISA warns of ongoing Accellion File Transfer Appliance attacks

25 Feb 2021

Most Popular

How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021