I always wonder about this though. Are hackers really going to manually test out my password in miscellaneous sites? How would they know what sites to try? And why me along the hundreds of thousands of passwords they would have stolen with mine? Seems like that’s something they would do if they’ve targeted a particular person, not if they’ve stolen a whole dump of credentials
No, that won’t manually test it in random sites. They will add this creds to their bot net to test Mandy specific sites like Facebook, Twitter, GMail, several larger financial institutions, and many others.
Always use different strong passwords and use MFA wherever it’s available. Security, like ogres, has layers.
They create giant databases of every breached password in rainbow tables from previously breached password hashes, and then try them all if they ever expose another breach. If they get a database in a breach they can try a lot, like trillions, very fast.
Re-using passwords makes things much easier for them.
Bots attempt passwords on sites’ login forms all the time but aren’t very effective. Usually have hundreds a day even when I had a wedding site not even listed on google. Probably only works for very short and frequently used passwords.
Glad I don’t reuse passwords.
I always wonder about this though. Are hackers really going to manually test out my password in miscellaneous sites? How would they know what sites to try? And why me along the hundreds of thousands of passwords they would have stolen with mine? Seems like that’s something they would do if they’ve targeted a particular person, not if they’ve stolen a whole dump of credentials
No, that won’t manually test it in random sites. They will add this creds to their bot net to test Mandy specific sites like Facebook, Twitter, GMail, several larger financial institutions, and many others.
Always use different strong passwords and use MFA wherever it’s available. Security, like ogres, has layers.
They create giant databases of every breached password in rainbow tables from previously breached password hashes, and then try them all if they ever expose another breach. If they get a database in a breach they can try a lot, like trillions, very fast.
Re-using passwords makes things much easier for them.
Bots attempt passwords on sites’ login forms all the time but aren’t very effective. Usually have hundreds a day even when I had a wedding site not even listed on google. Probably only works for very short and frequently used passwords.