Credit to our own IT Security Expert @sgt_zim for these great TIPS to avoid getting scammed online.
What do your passwords look like?
In my mind there are two kinds of passwords you should use.
I probably have more than 400 online accounts...banks, BBS like this one, shopping, etc. I don't know a single one of those passwords.
For most people, there are probably only 2 passwords you should remember off the top of your head - the one you use to log on to your PC, and the one to your password vault. Note that MS Excel does NOT count as a password vault. If a malicious actor breaks into your PC, one of the very first things he's going to do is search for all files with a spreadsheet...
If I haven't mentioned it before now...
I'm in the IT security biz. I mostly defend my employer, but I also engage in attacking (called "red teaming").
Without any question at all, the very best thing you can do to secure your computer is to run updates as frequently as they are available - for the operating system as well as non-OS applications like Firefox, Chrome, Notepad++, Adobe Acrobat, and a host of others.
When I run scans against a potential victim, I love nothing better than seeing outdated software. And the older, the better for me because it means I don't usually...
phishing - generally an attempt via email to get you to
- click on an (malicious) attachment
- click on a hyperlink which will carry you to a malicious website (called a "watering hole" ) where you might be tricked into giving up credentials to (usually) your bank account
- click on a hyperlink which will carry you to a watering hole which will auto-download malware to your computer
WRT malicious attachments, if you get an email from somebody you do not know, and the email has an attachment, delete the email straight away.
If you get an email from somebody you DO know, but...
Yeah, if we'd been pwned here, there'd be a great many more than a single user with an issue.
So people understand why a one-off like this is so improbable if we're thinking "hacked website," understand that your actual password isn't stored anywhere. What's actually stored in the database is what's called a hash of your password.
Pretend like "ThisIsMyPassword" is your password. Add a little salt (known but random characters in front and behind that, this is done in the background, not all developers do this, I did when I was building corporate websites eons ago), run that entire thing through a NON-REVERSIBLE* hashing algorithm, and what gets stored in the database would look something like this:
C0CB3825FFB2B20432FD08DEC3F754E901A0C1C8C394D89C5C7F505C5FB6F9C2
Running the above string of gibberish through the same hashing algorithm that generated it would result in this hash
D2CBFD0D2398720048D612759032CA4338651DEEE27ACC2DC0CB70801C79CFB5. This one obviously doesn't match the previous one, so access denied.
Even if somebody had broken in and got hold of the user accounts here, that's what he would see as the password. But that isn't your password, it's a hash of your password, plus some salt. If he pasted that in to try to log in as you, that hash would get passed through the same hashing algorithm and would be completely different, and that new hash wouldn't match the hash stored in the database, so access would be denied anyway.
When you log in here, or anywhere, that's what happens. The password you type into the text box is run through a salting and hashing algorithm, and if the hash generated by that matches the hash stored in the user account table in the database, then and only then is your login successful.
Jerome is probably right, the user account info was likely stolen via phishing.
* - non-reversible means exactly what you think it means. There's no way to reverse-engineer something that's been hashed, and that's by design. Hashing is a very important component to ensure integrity of a great many things, not just passwords.
With enough compute power and enough time, security certificates like the ones protecting websites can be reverse-engineered, but hashes simply cannot be.