No. of Recommendations: 0
Here's another thought:

Assuming the hackers are intent on using multiple accounts for whatever reason, they'll probably want inactive or moribund accounts -- the owner has passed away, for example, or perhaps forgot his access credentials and opened another account rather than try to recover access.

In that case, the hackers would log the accounts and then return later (days, weeks) to see if the compromise is still in place. Those that have their security restored would be discarded as being active, while those that are still compromised could be flagged as potentially useful in the future.

Print the post  


When Life Gives You Lemons
We all have had hardships and made poor decisions. The important thing is how we respond and grow. Read the story of a Fool who started from nothing, and looks to gain everything.
Contact Us
Contact Customer Service and other Fool departments here.
Work for Fools?
Winner of the Washingtonian great places to work, and Glassdoor #1 Company to Work For 2015! Have access to all of TMF's online and email products for FREE, and be paid for your contributions to TMF! Click the link and start your Fool career.