,

How Hackers Steal Data From Websites

With millions of Americans’ personal information becoming compromised by recent high-profile data breaches, many people are wondering just how anonymous hackers target and infiltrate these supposedly secure systems. Here is a step-by-step explanation of how your data can be stolen:

Step 1: Hacker undergoes 18 to 25 years of bullying, social neglect, and bruised ego to gain sufficient chip on shoulder

Step 2: A target is selected that has personally wronged the hacker, like 700,000 customers of a major retail corporation

Step 3: Initial access gained by locating vulnerabilities in the system and exploiting those backdoors via rootkit, a process that can only be fully explained with the utmost condescension

Step 4: Hacker sheepishly backtracks after realizing he ran script to enumerate VMware configurations like an idiot instead of the getcountermeasure.rb to detect third-party firewall processes

Step 5: Once database is breached, frustrated culprit attempts to sort through incredibly disorganized mess office manager has made of the files

Step 6: Face hauntingly illuminated by glow of computer monitor smirks before saying,“Toasted”

Step 7: The triumphant hacker celebrates a successful attack by delightedly rolling around in pile of Social Security numbers

Step 8: China blamed

Step 9: Hacker lies low for few months, begins six-figure job at data security firm




Sample front page of The Onion's DNC paper