{"id":851,"date":"2010-04-30T16:11:12","date_gmt":"2010-04-30T09:11:12","guid":{"rendered":"http:\/\/deepquest.code511.com\/blog\/?p=851"},"modified":"2010-05-06T02:54:40","modified_gmt":"2010-05-05T19:54:40","slug":"facebook-accounts-hacked-1-5-million-login-ids-for-sale","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2010\/04\/facebook-accounts-hacked-1-5-million-login-ids-for-sale\/","title":{"rendered":"Facebook Accounts Hacked: 1.5 Million Login IDs For Sale"},"content":{"rendered":"<p>Want a great deal on a\u00a0Facebook account? A Russian hacker who calls himself &#8220;kirllos&#8221; claims he can sell you 1,000 unsuspecting users&#8217; login credentials for just $25, or $45 if the accounts have more than 10 friends each.<\/p>\n<p><!--more--><\/p>\n<p>The hacker is believed to have stolen the IDs of 1.5 million Facebook users. If accurate, that means one out of every 300 Facebook users may have been victimized. Kirllos is selling the information on an underground hacker website, according to\u00a0VeriSign&#8217;s iDefense Labs. The cybersecurity company estimates that kirllos has sold around 700,000 accounts so far, but\u00a0VeriSign\u00a0was unable to verify if any of the accounts are legitimate accounts belonging to real Facebook users.<\/p>\n<p>Kirllos&#8217; prices are incredibly cheap compared to other scams for sale. E-mail usernames and passwords usually fetch between $1 to $20 each, according to\u00a0<a href=\"http:\/\/www.symantec.com\/business\/theme.jsp?themeid=threatreport\">Symantec&#8217;s latest Internet Security Threat Report<\/a>. In contrast, Kirllos is claiming he will sell accounts for as little as 25 cents each.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Want a great deal on a\u00a0Facebook account? A Russian hacker who calls himself &#8220;kirllos&#8221; claims he can sell you 1,000 unsuspecting users&#8217; login credentials for just $25, or $45 if&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[93,3],"tags":[2872],"class_list":["post-851","post","type-post","status-publish","format-standard","hentry","category-privacy","category-security","tag-facebook"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-dJ","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=851"}],"version-history":[{"count":6,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/851\/revisions"}],"predecessor-version":[{"id":857,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/851\/revisions\/857"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}