caschotchb14_ESO wrote: »4. I would assume both. 1 account to farm the gold that way they get a high enough level toon to farm ever increasing amounts of gold to sell. 2nd account to advertise said selling of gold that they know will get banned, then they just keep buying a new 2nd account or stealing one.
In most online games, including WoW, a huge margin of the gold purchased from sites (we're talking 95% or more) is stolen gold from compromised accounts.
Lol? Noone bruteforces a password, sorry. If you have a long password - say 10-12 character long - it's highly unlikely anyone will succesfully brute force it, it would take years.shinkicker444rwb17_ESO wrote: »Often because people browsing unsafe or community sites that get their ad service compromised to install a key tracker to collect that info, email as well. But all they need is your account name to try and brute force guess the PW, getting your email makes it easier still, and if they get the PW you're boned.
There is no real need to brute force it, social engineering and a bit of phishing works wonders. Ever wonder why you keep seeing those poorly spelled emails telling you that your account is compromised and you need to log in through it? Because some people are stupid enough to believe it and reply to them.shinkicker444rwb17_ESO wrote: »In most online games, including WoW, a huge margin of the gold purchased from sites (we're talking 95% or more) is stolen gold from compromised accounts.
Often because people browsing unsafe or community sites that get their ad service compromised to install a key tracker to collect that info, email as well. But all they need is your account name to try and brute force guess the PW, getting your email makes it easier still, and if they get the PW you're boned.
Lol? Noone bruteforces a password, sorry. If you have a long password - say 10-12 character long - it's highly unlikely anyone will succesfully brute force it, it would take years.shinkicker444rwb17_ESO wrote: »Often because people browsing unsafe or community sites that get their ad service compromised to install a key tracker to collect that info, email as well. But all they need is your account name to try and brute force guess the PW, getting your email makes it easier still, and if they get the PW you're boned.
1. Pretty much what everyone has said, it's both.Publius_Scipio wrote: »Gold Sellers
1.) Are they real people sitting there for hours spamming or bots?
2.) Their website is designed to steal credit card information?
3.) How did they infiltrate ESO so quickly and at such a high population?
4.) Do they actually purchase a copy of the game solely for selling gold and not playing?
I seriously doubt that. With brute force even a standard ~60 key pw crack would take ages. Every time you will have to wait the result and it takes a long time (from a computer's point of view). Running a brute force crack - for example a rar password - is rather slow as well and it's on your own machine not in a distant server. For reference a 5 character password takes 5 hours. 6-300. 7-18000, etc. It's unrealistical to expect that you'd live to brute force crack a 10 character password.shinkicker444rwb17_ESO wrote: »Perhaps, but PWs around 10 letters in length can be broken in less then a day.
And contrary to popular belief, wows main way of account hacking thesr days includes gold sellers buying or stealing fansite user databases.In most online games, including WoW, a huge margin of the gold purchased from sites (we're talking 95% or more) is stolen gold from compromised accounts.
There are still games where there are 'chinese farmers', but in most MMO's it is not feasible to farm, and so they have resorted to theft via stealing account info to fund their business.
Lol? Noone bruteforces a password, sorry. If you have a long password - say 10-12 character long - it's highly unlikely anyone will succesfully brute force it, it would take years.shinkicker444rwb17_ESO wrote: »Often because people browsing unsafe or community sites that get their ad service compromised to install a key tracker to collect that info, email as well. But all they need is your account name to try and brute force guess the PW, getting your email makes it easier still, and if they get the PW you're boned.
Note - that password doesn't even have to be particularly strong. 12x a lowercase 'a' is just as hard to crack as 12 special characters. So yes, if you are not careful, your pw will get stolen anyway, no matter how 'secure' your pw is. For everything else - the longer the password the more unlikely anyone will ever crack it.
eq2imora_ESO wrote: »They dont need to when the lazy or forgetful use their b.net email and pw to register for a fansite or guild hosting site.
Maybe if you are using your cpu, most of the bruteforcing done now is with gpus and that is after they gained the encrypted passwords. It all depends on the site and if they even bother with encryption. Because hey, security through obscurity means no one is going to get your password if it's left in plain text on a server somewhere (*cough* Sony *cough*).I seriously doubt that. With brute force even a standard ~60 key pw crack would take ages. Every time you will have to wait the result and it takes a long time (from a computer's point of view). Running a brute force crack - for example a rar password - is rather slow as well and it's on your own machine not in a distant server. For reference a 5 character password takes 5 hours. 6-300. 7-18000, etc. It's unrealistical to expect that you'd live to brute force crack a 10 character password.shinkicker444rwb17_ESO wrote: »Perhaps, but PWs around 10 letters in length can be broken in less then a day.
eq2imora_ESO wrote: »They dont need to when the lazy or forgetful use their b.net email and pw to register for a fansite or guild hosting site.
I can only congratulate for that. I also do not know why a fansite is allowed to see passwords. Passwords should be stored encrypted and it should be enforced by law. There's no reason to see a user's password.
kickamyassa_ESO wrote: »Maybe if you are using your cpu, most of the bruteforcing done now is with gpus and that is after they gained the encrypted passwords. It all depends on the site and if they even bother with encryption. Because hey, security through obscurity means no one is going to get your password if it's left in plain text on a server somewhere (*cough* Sony *cough*).
Even if you are 100x as fast, it means you will finish it in 800 years instead of 80000:) Doesn't matter, generally speaking a 10+ character password is strong enough to hold until the information it protects is worthless anyway.kickamyassa_ESO wrote: »Maybe if you are using your cpu, most of the bruteforcing done now is with gpus and that is after they gained the encrypted passwords. It all depends on the site and if they even bother with encryption. Because hey, security through obscurity means no one is going to get your password if it's left in plain text on a server somewhere (*cough* Sony *cough*).