Can a hacker access your email address and then choose to do nothing?

Okay, I know my question might sound a bit weird, but I am in a situation where I need knowledge on the subject (btw, if someone can assure me that there was never a Discord or Google data breach since 2018, even unknown to the public, I would be grateful).

I have done a bit of research on what hackers look for in an email address, and it looks like any information is valuable to them, but a friend that knows about the subject has told me that it was possible that a hacker decides to do nothing to your account if you’re "broke or a child".

I was confused, because I think even in that case, it would be possible (and useful) for them to send emails to my contacts on my behalf or log me out and ask for ransom or something like that.

So, is it really possible that a hacker just gives up on your address, and if so, how likely is that ?

Hacker for Hire services? [closed]

I think sometimes it is best to look into different research scheme , get information on which is the best place to get this programmer guys , I was once a victim and I vowed never to contact again . I work in a place where we do mostly marketing and I always like to get information by any means . My colleague in the office was always was always having treasures and most customers , I kept wondering how , until we had lunch together sometime , I asked him whats up with that . They only thing I heard was , He uses the services of Greyhatzhackers to gain access to emails of competitors , and then he gives their customers a better deal ( and that was it ) It sounded strange and weird to me until I gave it is a shot . haha He told me that all I needed to do was add ATGmaiilDOTco m to their name and I should be able to get with them . I was scared because I know most times these things are illegal but 2 weeks later , this is me now smiling and getting more customers too . haha God bless this hacker guys . lol

How likely it is that a hacker spoofed my own IP address when trying to log in to a website?

I got a confirmation code without trying to log in which is what prompted me to investigate this. The account is just a Ubisoft account with 1 free game on it; I somehow doubt there would be motivation to employ sophisticated hacker techniques.

I know about Tor services and VPN, but I don’t think those would spoof my own IP address. When I look at the log-in history for my account, it says my very own IP (at least, an IP with the same first and last segment) failed a login attempt 15 minutes ago and I definitely don’t remember doing anything remotely related to that account in the last 12 hours. Did a hacker actually spoof the correct first and last numbers of my IP, or is this more likely some sort of bug? How would they even know the right IP to spoof in the first place

How to find and monitor a hacker in a web project? [on hold]

we currently have a hacker in a project who uses MySQL injections to get access and read parts of the database. He sent us accurate screenshots of his successful attacks by showing the database architecture. He uses well-known tools so there is somewhere a variable that is unsecure. However, the project is a large project and we want to find the one or more variables as fast as possible. How can we find and monitor a hacker in a project? Our first approach was to scan the server log but this doesn’t show successful or not successful attempts but only all requests. (In the meantime the developers are already looking for those variables, but this is a huge project)

How does hacking work? How does a hacker spy on a system?

According to my understanding a hacker has two options to spy on someone. He can trick the user into installing the spyware himself or if that doesn’t work he has to find a service that the target is using which has vulnerabilities that he can exploit. If he finds a vulnerability that allows him to gain a shell he has access to the whole system. This is known as an intrusion and can be detected by intrusion detection systems. The antivirus does not detect this. This is like picking a lock of a door (not breaking it). It does not make any permanent changes to the system. If the hacker gets disconnected here he has to repeat the whole process again.

After gaining access to a system the hacker has to install spyware to spy and a backdoor to gain easy access to the system. This modifies the system and these modifications can be detected by antivirus.

Is this correct?