Access your Pro+ Content below.
How long does it take to get owned?
Sponsored by TechTarget ComputerWeekly.com
This article is based on the thesis - How long does it take to get owned? - a study to investigate the amount of time that it takes for stolen credentials to be used by a hacker. It describes the design of fake online identities (“honey identities”), an infrastructure for monitoring their activity and an experiment to test the developed prototypes in which we discovered that it can take as little as 34 minutes for a leaked password to be used.
Table Of Contents
- “Honey identities” were developed to facilitate an experiment to investigate the use of stolen credentials.
- A number of honey identity accounts were released on a popular paste website – emulating a common method that cyber criminals use to share stolen credentials.
- There is scope to conduct a fuller experiment by advertising the credentials on dark market websites, under the guise of a bigger breach.