Stolen Credentials Breaches

Discussions focus on how attackers compromised company systems via stolen or weak employee credentials, such as admin/password or support accounts, debating methods like phishing, leaks, or insider access over software vulnerabilities.

📉 Falling 0.4x Security
4,449
Comments
20
Years Active
5
Top Authors
#8404
Topic ID

Activity Over Time

2007
4
2008
12
2009
62
2010
60
2011
159
2012
153
2013
282
2014
207
2015
193
2016
256
2017
221
2018
208
2019
340
2020
367
2021
400
2022
411
2023
383
2024
379
2025
336
2026
16

Keywords

US SQL SolarWinds reuters.com AWS NDA OS CEO ycombinator.com BART password credentials access admin attacker security compromised keybase passwords employee

Sample Comments

scintill76 Sep 15, 2014 View on HN

I think it was deep access to one customer's network, and probably their own fault for choosing lame credentials.

viraptor Jul 8, 2019 View on HN

We don't know that. Their system could've been compromised in some other way and the password captured.

rsyntax Sep 15, 2017 View on HN

agreed but the hack was a result of credentials being "admin/password"

Leynos Jun 24, 2017 View on HN

The story suggests that remote access has been disabled following a password leak, which suggests some form of malicious attack.

StavrosK Mar 2, 2012 View on HN

I don't think there was a vulnerability. As I understood it, somebody stole a support person's credentials and logged in with them.

SoftTalker Apr 12, 2024 View on HN

Possibly the credentials were encrypted, but the attackers got the encryption keys as well?

deathhand Nov 6, 2014 View on HN

"successfully infiltrated the support staff" - This doesn't rule out that they didn't sniff out their credentials and logged in as them.

justinclift Jun 20, 2018 View on HN

Hmmm, it sounded to me more like the person had gained access to other employee's credentials. eg usernames/passwords or similar.

jnewland Oct 9, 2025 View on HN

This is a pretty hilarious and long-winded way to say "we have no idea how to lock someone out of a web service:"> 1. While Ruby Central correctly removed access to shared credentials through its enterprise password manager prior to the incident, our staff did not consider the possibility that this credential may have been copied or exfiltrated to other password managers outside of Ruby Central’s visibility or control.> 2. Ruby Central failed to rotate the AWS root account

p0seidon May 31, 2024 View on HN

There may have been administrative access that was not properly secured.