Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There were rumors a couple years ago that this already happened to one of them.

My layperson's armchair guess is that a successful attacker would probably seek to keep it quiet.

If you were a bad person, and you got access of tons of credentials from one of the major trust-us password managers, would you:

1. Focus on finding and looting big-payout cryptocurrency stashes, as quietly as you can (so you can keep doing it longer, before news gets out of how)?

2. Sell to a state actor to use for probably high-value purposes, while keeping it quiet?

3. Something else, and would that involve keeping it quiet, or making a big noisy mess?



Most hacks, these days, seem to fall into one of three categories:

1. State actors

2. For profit criminals

3. Teens for lulz and street cred

I guess the first group would probably keep it pretty quiet. The second would keep it quiet until they've abused the data as much as they want to, then sell the remainder on the dark web. The third would make a big noisy mess right away.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: