• Mon - Thurs : 8.00am - 5.00pm / Fri : 8.00am - 12.15pm, 2.45pm - 5.00pm
  • helpdesk@um.edu.my

ICT Security : Make Your Information Hard to Steal

March 21, 2024
539 views

Dear Campus Community,

Credential Leak

What?

A credential leak occurs when sensitive information, such as usernames, passwords, and API keys, is exposed to the public.

How?

This can happen in any number of ways, including data breaches, phishing attacks, credential stealers, and social engineering.

Consequences

Leaked credentials can be used by attackers to gain unauthorized access to your organization's systems and data. This can lead to data theft, financial losses, and reputational damage.

Credential Stealers

Malicious software (malware) continues to evolve, with various types targeting sensitive data for financial gain.

Stealers are a type of malware that target sensitive data, including login credentials, payment information, personal documents, and more.

Stealers are commonly delivered through phishing emails, malicious websites, or compromised software downloads.

How to Reduce the Risk?
It is important to have multi-factor authentication for your account logins.