|
The mass nature and linking to exact URL addresses indicate that it was a distributed action and not a hack into the infrastructure of any operator or website. Has my password been stolen from a website or online store If your login is in a published database, the most likely scenario seems to be that it was captured on your phone, tablet or computer. Breaking into the infrastructure of the operator of any serious application - and we are talking about the largest Polish websites - would not allow passwords to be stolen. Passwords in modern architectures are not stored in databases or files, so they cannot be stolen from the operator. Banks, stores and websites do not know passwords, only their digital "prints".
There is a relationship here that is somewhat similar to a key and a lock - the user Phone Number List knows the password, and the operator can only confirm whether it is correct or not. Also with regard to possible services in our infrastructure, it is worth emphasizing that there was no incident on the server or in the applications. The source of the problem is malicious software that is designed to infect a computer or phone and then steal and send credentials from infected devices. There are millions of records in the list. We have no way of checking whether your logins to any websites you use are there, but just in case, we recommend that you complete the following procedure. Will you publish this list No, because according to press releases, of services. We believe that distributing this type of list would be more harmful than helpful.
What should I do now As both time and reaction speed are of great importance here, we suggest the following instructions for our recommended course of action. If your device has not been infected yet, by following the recommendations below, you will increase the likelihood that your sensitive data is stored correctly and safe, and you have a chance to avoid consequences if your device is infected. Step-by-step instructions – apply to all devices from which you log in to websites: Immediately review your installed software and applications and uninstall any that seem suspicious to you.
|
|