Back To Top

Free Rider Jumps (Non Facebook)

Discussion in 'Game changes and Updates' started by Char, Sep 20, 2018.

  1. doge_eating_chicken

    doge_eating_chicken Well-Known Member Official Author

    Char the game wont work, i cant get to it
     
  2. SeanPeyton

    SeanPeyton Well-Known Member Official Author

    char left :|
     
    pawflix likes this.
  3. doge_eating_chicken

    doge_eating_chicken Well-Known Member Official Author

    oop
     
  4. Cryx

    Cryx Well-Known Member Team Truck Official Author

    Calculus how are these accounts getting hacked?
     
  5. Volund

    Volund ithring VIP Official Author

    Awarded Medals
    Oh man… that’s actually a really good question, and it’s not as simple as “someone guessed the password” like people usually assume.

    When someone asks “how are these accounts getting hacked?”, what they’re usually picturing is some hoodie-wearing movie villain brute-forcing passwords all day until one works. In reality, most account compromises are way less dramatic — and way more mundane — than that.

    A huge percentage of these “hacks” aren’t really targeted hacks at all. They’re the result of things like data breaches from completely different websites. Let’s say someone used the same email and password combo on a random forum, a shopping site, or some old app years ago. That site gets breached. The email/password list ends up floating around online. Attackers then run what’s called “credential stuffing,” where they automatically try those same login combinations across major platforms. If someone reused their password? Boom. They’re in. No genius-level hacking required — just automation and scale.

    Another common way accounts get taken over is phishing. And phishing today is way more sophisticated than those old “You have won $1,000,000” emails. People get DMs that look like they’re from friends. Or emails that look almost identical to legitimate login pages. Sometimes it’s a fake “copyright violation” or “account verification” notice that pressures someone to click quickly. The login page looks real. They enter their credentials. And they’ve just handed them directly to the attacker.

    There’s also malware — stuff installed accidentally when someone downloads a cracked app, a fake plugin, or even a browser extension that looks harmless. Some malware is designed specifically to steal stored passwords or session cookies. And session cookies are important: if someone grabs your active session token, they might not even need your password. They can just import the session and access the account as if they’re already logged in.

    And then there’s social engineering. This is the part people underestimate the most. Sometimes attackers don’t break into accounts — they talk their way in. They impersonate support. They convince someone to share a verification code. They trick people into thinking they’re resolving an issue. It’s less about technical skill and more about psychological manipulation.

    Weak security settings also play a role. No two-factor authentication. Security questions with answers that are easily guessable or publicly available. Publicly shared personal info that can be used to reset accounts. All of that lowers the barrier.

    There’s also SIM swapping, which is a big one. If someone can convince a mobile carrier to transfer your phone number to a new SIM card, they can intercept SMS-based verification codes. That’s why app-based authentication is generally safer than SMS.

    so all this to say idrk lol.
     
    Cryx and pawflix like this.

Share This Page