Advertisement
Singapore markets open in 6 hours 14 minutes
  • Straits Times Index

    3,187.66
    +32.97 (+1.05%)
     
  • S&P 500

    5,011.36
    -10.85 (-0.22%)
     
  • Dow

    37,762.97
    +9.66 (+0.03%)
     
  • Nasdaq

    15,612.65
    -70.72 (-0.45%)
     
  • Bitcoin USD

    63,215.84
    +1,392.02 (+2.25%)
     
  • CMC Crypto 200

    885.54
    0.00 (0.00%)
     
  • FTSE 100

    7,877.05
    +29.06 (+0.37%)
     
  • Gold

    2,395.80
    +7.40 (+0.31%)
     
  • Crude Oil

    82.69
    0.00 (0.00%)
     
  • 10-Yr Bond

    4.6430
    +0.0580 (+1.27%)
     
  • Nikkei

    38,079.70
    +117.90 (+0.31%)
     
  • Hang Seng

    16,385.87
    +134.03 (+0.82%)
     
  • FTSE Bursa Malaysia

    1,544.76
    +4.34 (+0.28%)
     
  • Jakarta Composite Index

    7,166.81
    +35.97 (+0.50%)
     
  • PSE Index

    6,523.19
    +73.15 (+1.13%)
     

Hacker sells access to hundreds of corporate executives' email accounts

The breaches could lead to extortion or fraud.

Hackers are fond of hijacking email accounts, and one of them may have obtained a motherlode of potential targets. ZDNet and Gizmodo report that a hacker is selling claimed access to “hundreds” of C-suite executives’ Microsoft-based email accounts, including CEOs, vice presidents and directors. The targets include the chief of a mid-sized American software company, the president of a US apparel maker and the CFO of a European retail chain.

The accounts are on the market in a limited-access Russian underground forum and sell for $100 to $1,500 each depending on the value. Threat intelligence firm KELA noted the hacker might have obtained the account logins by buying data from computers infected with a data-stealing AzorUlt trojan.

A source for ZDNet claimed to have confirmed authenticity of two accounts, although it’s not certain if that holds for every victim. That same tipster is also notifying companies whose information is known to have leaked.

If the login theft is as successful as it seems, it could hurt both the executives and their workers. This could be used for relatively common scams that fool rank-and-file staff into sending money to hackers posing as company leaders. The accounts might also help with blackmail and extortion campaigns. Intruders could even crack other accounts by using the access to defeat email-based two-factor authentication. To put it another way, the damage could extend well beyond the leaders themselves.