It is worth checking logins, definitely. That's how I discovered a breach and prompted the user to change her password ASAP. What is strange is the way the intruders behaved.

First came 50.171.64.170, on the 7th around noon UTC. It had made 590 login attempts to this server since March 2024, using both existing and non-existent accounts. This time, it succeeded; it seems possible, given that the password was trivial.

Second came 98.181.46.43, on the 8th around 11 a.m. UTC. No previous violations at mine.

Then came 129.80.228.231, ten minutes after the second. Only 91 violations at mine since April 2025.

All three IPs are 100% abusive according to AbuseIPDB, which is how I spotted 
them.

The user changed her password a couple of hours after the third breach.

It looks like the second and the third hackers acquired the password from the first. The strange thing is that no one sent tons of spam exploiting the breach. All they did was send a single message each, the first to [email protected], the second and third to [email protected].

Is this a non-exploitative password trading?


Best
Ale
--





_______________________________________________
mailop mailing list
[email protected]
https://list.mailop.org/listinfo/mailop

Reply via email to