Tag

database dumping

0 views collected around this technical thread.

Full-Stack Internet Architecture
Full-Stack Internet Architecture
Mar 25, 2020 · Information Security

Understanding Weibo Data Breaches: Credential Stuffing, Database Dumping, and Data Laundering

The article explains the recent Weibo data breach, describing how attackers used credential‑stuffing (撞库), data leakage (漏水), database dumping (拖库) and data laundering (洗库) to obtain millions of user records, the technical steps involved, and the security implications for both users and platforms.

Credential StuffingWeibodata breach
0 likes · 6 min read
Understanding Weibo Data Breaches: Credential Stuffing, Database Dumping, and Data Laundering