Are your passwords stored securely?

1 August 2019 Information Security

The use of malware designed to harvest consumers’ digital data – known as password stealers – has seen a significant rise in 2019. According to Kaspersky’s data, the number of users targeted by the stealers peaked from less than 600 000 in the first half of 2018 to over 940 000 during the same period in 2019.

Password Stealing Ware (PSW) is a major weapon in the cybercriminals’ toolkit to sabotage users’ privacy. This malicious type of software grabs data directly from users’ web browsers using various methods. Quite often, this information is sensitive and includes access details for online accounts as well as financial information – like saved passwords, autofill data and saved payment card details.

In addition, some families of this type of malware are designed to steal browser cookies, user files from a specific location (for example, a user’s desktop) as well as app files, such as messenger services. One of the most widespread stealer Trojans was multifunctional Azorult, detected on the computers of more than 25% of all users who encountered Trojan-PSW type malware in the examined period.

“Modern consumers are increasingly active online and understandably rely on the Internet to carry out many tasks in their daily lives. This fills their digital profiles with more and more data and details and makes them a lucrative target for criminals as they could be monetised in numerous ways afterwards. By securely storing passwords and credentials, consumers can use their favourite online services in confidence that their information will not be put at risk. This should also be supported by installation of a security solution as one can never be too careful,” notes Alexander Eremin, security researcher at Kaspersky.

Kaspersky recommends that consumers follow this advice to ensure their passwords and other credentials remain secure:

•Do not share passwords or personal information with friends or family as they could unwittingly make them vulnerable to malware. Do not post them on forums or social media channels.

•Always install updates and product patches to ensure protection from the latest malware and threats.

•Start using a reliable security solution that is designed to securely store passwords and personal information, including passports, driver's licences and bank cards.

Read more about how cybercriminals use malware to steal passwords and other confidential information on www.securelist.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...
Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
Zero Trust and user fatigue
Access Control & Identity Management Information Security
Paul Meyer, Security Solutions Executive, iOCO OpenText, says implementing Zero Trust and enforcing it can create user fatigue, which only leads to carelessness and a couldn’t care attitude.

Read more...
Passwordless, unphishable web browsers
Access Control & Identity Management Information Security
Passkey technology is proving to be an easily deployed way to bring unphishable, biometric-based security to browsers; making identification and authentication much more secure and reliable for all parties.

Read more...
Practical guide to protect data privacy
Training & Education Information Security
The Data Privacy Toolkit, reflecting the evolving landscape of data privacy, includes guidelines and recommendations to safeguard sensitive information crucial for protecting sensitive information from malicious actors.

Read more...
Exclusive Networks Africa partners with HCLSoftware
News & Events Information Security
Exclusive Networks Africa has secured an agreement with HCLSoftware, the software business division of HCLTech, which will see the cybersecurity specialist for digital infrastructure add the HCLBigFix endpoint management platform to its existing cybersecurity offering.

Read more...