This article is about credentials that are stolen directly from users’ devices that are compromised with malware. So they will be that user’s passwords for whatever services they were using while infected with the malware. This is why the dumps contain passwords for just about every online service that exists.
This isn’t an actual database breach of the major providers.
Thanks for clarifying. Still, does this affect every “device” user out there? There must be some sort of explanation here, what’s the attack vector etc. I couldn’t find it even on that Lithuanian guy’s website.
This article is about credentials that are stolen directly from users’ devices that are compromised with malware. So they will be that user’s passwords for whatever services they were using while infected with the malware. This is why the dumps contain passwords for just about every online service that exists.
This isn’t an actual database breach of the major providers.
Thanks for clarifying. Still, does this affect every “device” user out there? There must be some sort of explanation here, what’s the attack vector etc. I couldn’t find it even on that Lithuanian guy’s website.