How Secure is your Domain? Get Soliton’s vulnerability ......LinkedIn Twi er Yahoo! Dropbox NO...
Transcript of How Secure is your Domain? Get Soliton’s vulnerability ......LinkedIn Twi er Yahoo! Dropbox NO...
How Secure is your Domain? Get Soliton’s vulnerability assessment report to
assess where your data leakages are
98.9%
600+Data Breach Incidents
20 Billion+Compromised
Creden�als
1,000+Analyzed Domains in
All Industries
of domains have at least one breached account*Based on all domains analyzed between July 2017~June 2018
Is your organiza�on protected?
User ID
Password
Address
Phone
Government
BFSI
Retail
Automo�ve
Manufacturing
Adobe
Twi�er
Yahoo! Dropbox
NO Breach Incident Overview of Breaches Country Date Total Breaches # of Accounts Remarks
11.4 billion
C redentia ls
In mid December 2017, 4iQ, a security intelligence company based in the US, issued a press release and warning titled “1.4 Billion Clear Text Credentials Discovered in a Single Database.”At Soliton, we have unconvered these 1.4 billion credential records using open source intelligence (OSINT) – not via the dark web – and found these records were stored as in a file format rather than in a database, making it much easier to access and decipher to identify targets and their credentials for unauthorized login.
unknown Dec 2017 1.1 B
Email addresses Passwords
84 Plaintext password
2 A nti P ublic
In December 2016, a huge list of email addresses and passwords in pairs appeared in a "combo list" commonly referred to as "Anti Public." The list contained 458 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for "credential stuffing", where attackers employ it in an attempt to identify other online systems where the account owner had reused the same password.
unknown Dec2016 458 M
Email addresses, Passwords
50 Plaintext password
3
In May 2016, LinkedIn announced 164 millionaccounts including email addresses and passwordshad been exposed. Originally hacked in 2012, thedata remained out of sight until being offered forsale on a dark market site 4 years later. Thepasswords in the breach were stored as SHA1hashes without salt, the vast majority of which werequickly cracked within days following the release ofthe data.
Jun2012 164 M
Emailaddresses,Passwords
36The numberincludes accountsfor which passwordscannot be found.L inkedIn
Visualize.
Analyze.
See where your e-mail accounts, passwords and other creden�als have been breached
Deep dive into the accounts which have been breached, and iden�fy poten�al future risks
Infer r ed na me
B r e a c h e d i n f o r m a t i o n
E ma il a ddr es sB r ea c hed webs ites ID
P a s s wor dsNote
P la in E nc r ypt Hints
a flores [email protected]
1.4 billion Credentials
Antipublic
Collection #1
Exploitin
a meyer [email protected] Adobe
a porter [email protected] 1.4 billion Credentials
b bowman [email protected] 1.4 billion Credentials
b campbell [email protected] Dropbox
b carter [email protected]
1.4 billionCredentials
Acne.org
Adobe
Antipublic
Collection #1
Phone: 714-243-6121E-mail: [email protected]: h�ps://www.solitonsys.com/
Soliton Systems2635 North First Street, Suite 213San Jose, CA 95134
Japan’s trusted technology leader for
over 40 years